spfinner17

Cybersecurity Made Simple – 5 Steps to Securing Your Work From Home Network

Define approved hardware, software and cloud-based products allowed to be utilized by employees. Security and system usage policies should be defined, documented, distributed and trained upon.  These policies should usage restrictions of company owned assets and define security requirements of personal mobile devices, laptops, etc. Define wireless home network (wifi) security requirements and publish “How […]

Cybersecurity Made Simple – 5 Steps to Securing Your Work From Home Network Read More »

issecuritysolutions, is security solution

Vendor Management – Key points when reviewing vendor security

Before clicking I Accept, I Agree or signing a contract, it’s imperative to understand the risk being assumed. The first consideration is, “What?” What information will the vendor have access to? Will data be stored by the vendor? What processes will the vendor be performing on my behalf?  These questions help define security, privacy, confidentiality

Vendor Management – Key points when reviewing vendor security Read More »

Cybersecurity Made Simple – 5 First Steps to becoming Compliant

Cybersecurity, a word that has become so daunting most feel it’s a subject they could never understand, let alone a process they could implement in their business or home.  While the concepts of hacking are complex, many of the most effective preventative steps are quite simple to implement.   Enable Multifactor Authentication (sometimes referred to

Cybersecurity Made Simple – 5 First Steps to becoming Compliant Read More »

Shopping Cart