Cybersecurity

Cart

Ransomware Attack -5 Steps to reduce your susceptibility

Protecting against ransomware needs to be embedded within every part of the organization. It is important clearly defined security policies are in place, trained upon and monitored for compliance. Implementing a security framework, such as NIST, can help ensure the appropriate level of controls are in place across the company. Policies and defined procedures surrounding […]

Ransomware Attack -5 Steps to reduce your susceptibility Read More »

Cybersecurity Made Simple – 5 Steps to Securing Your Work From Home Network

Define approved hardware, software and cloud-based products allowed to be utilized by employees. Security and system usage policies should be defined, documented, distributed and trained upon.  These policies should usage restrictions of company owned assets and define security requirements of personal mobile devices, laptops, etc. Define wireless home network (wifi) security requirements and publish “How

Cybersecurity Made Simple – 5 Steps to Securing Your Work From Home Network Read More »

issecuritysolutions, is security solution

Vendor Management – Key points when reviewing vendor security

Before clicking I Accept, I Agree or signing a contract, it’s imperative to understand the risk being assumed. The first consideration is, “What?” What information will the vendor have access to? Will data be stored by the vendor? What processes will the vendor be performing on my behalf?  These questions help define security, privacy, confidentiality

Vendor Management – Key points when reviewing vendor security Read More »

Cybersecurity Made Simple – 5 First Steps to becoming Compliant

Cybersecurity, a word that has become so daunting most feel it’s a subject they could never understand, let alone a process they could implement in their business or home.  While the concepts of hacking are complex, many of the most effective preventative steps are quite simple to implement.   Enable Multifactor Authentication (sometimes referred to

Cybersecurity Made Simple – 5 First Steps to becoming Compliant Read More »

Shopping Cart