What are Enclaves and Why Are They Important for Handling CUI?

One of our country’s more important assets is its information. The U.S. IT infrastructure carries private information covering things like financial information, private information, defense and military information or information that is critical to the operation of government agencies. Some information is classified, and some, while not deemed sensitive enough to classify, are protected as… Read More

The Evolving Cybersecurity Threats During the COVID-19 Pandemic

The U.S. Chamber of Commerce recently released a new report looking at the evolution of Cybersecurity threats during 2020, specifically during the COVID-19 pandemic. The pandemic has impacted businesses and individuals across every industry and geographic region. One of the significant areas affected is day-to-day work life. Remote work became the new normal for millions across the… Read More

Benefits of a Data Protection Impact Assessment (DPIA)

A Data Protection Impact Assessment (DPIA) is a process to help you identify and minimize the data protection risks of a project. The DPIA is an ongoing process, regularly applied to personal data processing, identifying, and mitigating risks. The DPIA is a part of the European Union (EU) General Data Protection Regulation (GDPR) compliance activities.

Key Cyber Security Lessons from the 2020 Twitter Hack

On July 16, the social media platform Twitter experienced one if not the most significant, security breaches in its history when cybercriminals hacked into major public figures’ verified accounts and convinced users worldwide to transfer them nearly $120,000 in bitcoin. What can other organizations learn from this Twitter hack?

Steps to ensure your Disaster Recovery Plan

There’s no telling when disasters will occur. The next disaster – a new epidemic, data breach, earthquake, or flood – could compromise data, result in lost business, or prevent employees from accessing a physical office. How quickly will your firm be ready to continue operations seamlessly? We have all experienced a change in the way… Read More

ISO 27000 Demystified

The ISO (International Organization for Standardization) and the IEC (International Electrotechnical Commission) provide a globally recognized framework for best-practice information security management: the ISO/IEC 27000 family of mutually supporting information security standards (also known as the ISO 27000 series). The most well-known of the series is ISO 27001, which sets out the specification for an… Read More

Something Phishy is happening – Phishing Scams on the Rise

Cybercriminals have been taking advantage of the coronavirus outbreak to target people with phishing scams and malware in the guise of information relevant to the disease. These attacks typically take the form of malicious apps, phishing emails, and phony websites. In addition, the US government has been offering stimulus payments, presenting another area ripe for… Read More

The Need for a Business Continuity Plan

The need for a business continuity plan is becoming more critical as businesses adjust to disruptions caused by the coronavirus. A virus in and of itself can’t shut your company’s systems, operations, or services down, but it can impact how a business functions. It’s not often that businesses face a pandemic. Still, natural disasters, human-made… Read More