Third-Party Vendors: 6 Tips to Manage IT Security Risk

Third-Party Vendors: 6 Tips to Manage IT Security Risk

How well do you know your third-party vendors? Recent cyber attacks on well-known entities via third-party vendors should make all companies cautious about who they're doing business with. Here's how you can avoid security risks from third-party vendors.

PCI Compliance: What is PCI Compliance?

PCI Compliance: What is PCI Compliance?

This is the first of a six-part blog series about Payment Card Industry (PCI) compliance. Over the next few weeks, we’ll be discussing PCI, its scope, compliance reporting requirements, readiness assessments, remediation, penetration testing, and vulnerability scans. By the end of this series, we hope our readers will have a better understanding of PCI, its importance, and how to become compliant with PCI security standards.

What Telecommuters Need to Know About Cyber Security

What Telecommuters Need to Know About Cyber Security

Working from home can be an efficient way to save you and your business time and money. However, when it comes to cyber security, do you know if your home and work networks are safe?

What CEOs Need to Know About Cyber Security

What CEOs Need to Know About Cyber Security

Regardless of the level of security you put into place or how many scenarios you have prepared for, you will be hacked. The attacks and breaches are going to occur no matter what you do. However, the rapidity to which you respond to and contain those breaches will be a direct result of how much you have put aside for cyber security.