1.888.749.9800

Uncategorized

  • Permalink Gallery

    Survey: Small construction companies lukewarm on tech investment

Survey: Small construction companies lukewarm on tech investment

by , author, Construction DIVE, February 28, 2018

Dive Brief:

  • A recent customer survey from small business funding siteKabbage revealed that fewer than 35% of small construction companies planned to make investments at some level this year in technologies that could help their businesses and further bring them into the digital age.
  • More than 65% of […]
By |March 1st, 2018|News & Events, Security Breach, Uncategorized|Comments Off on Survey: Small construction companies lukewarm on tech investment

How to secure data across multiple platforms

by Esther Shein, Contributing Writer, enterprise.net, April 24, 2017

When you adopt cloud services, some of your data is inevitably out of your direct control. Here’s what you need to know.

By now, moving at least some business processes to the cloud is not a question of if but when. So how do you keep your information safe while embracing all […]

By |April 26th, 2017|News & Events, Security Breach, Uncategorized|Comments Off on How to secure data across multiple platforms

Network Access Control (NAC)

Controlling access to the network is fundamental security control. For shared networks, the capability of users to connect to the network should be restricted. Well known security frameworks such as ISO 27002, Information technology – Security techniques – Code of practice for information security management, includes this control as a recommendation. And the […]

By |April 11th, 2017|Blog, ISO 27002, Uncategorized|Comments Off on Network Access Control (NAC)

Security compliance: How much is enough?

by Michael O’Dwyer, contributor, The PULSE of IT, November 23, 2015

Excerpt: Businesses should take baby steps when it comes to security compliance, starting with a security standard that is easier to comply with, like the ISO/IEC 27002, which deals with end-to-end security.

“It is easy to understand, and it is up to the company to determine the level of detail. […]

By |November 30th, 2015|News & Events, PCI Compliance, Uncategorized|Comments Off on Security compliance: How much is enough?

9 common enterprise cybersecurity myths

Joe Stangarone, writer,  MRCs Cup of Joe Blog, August 4, 2015

Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remain unprepared for an attack. Why? In many cases, they believe some common cybersecurity myths, which can put their data (and their customer’s […]

By |August 4th, 2015|ISO 27002, News & Events, Uncategorized|Comments Off on 9 common enterprise cybersecurity myths
  • Permalink Gallery

    Key Steps Enterprise IT Can Take to Safeguard its Operations

Key Steps Enterprise IT Can Take to Safeguard its Operations

IT systems pervade enterprises.  Systems are increasingly complex; enterprises constantly seek more rapid deployments.  And enterprises are increasing the volume and diversity of the data collected and analyzed. All of these factors mean that enterprises cannot rely on a small set of steps to safeguard its operations. Well established security frameworks such as PCI, HIPAA, ISO 27002 […]

By |May 1st, 2015|Blog, ISO 27002, PCI Compliance, Uncategorized|Comments Off on Key Steps Enterprise IT Can Take to Safeguard its Operations
  • Permalink Gallery

    27 Data Security Experts Reveal The #1 Information Security Issue Most Companies Face With Cloud Computing & Storage

27 Data Security Experts Reveal The #1 Information Security Issue Most Companies Face With Cloud Computing & Storage

Digital Guardian, November 12, 2014

”What is the number one issue most companies face with cloud computing and data security, and what can they do to address the issue?”

Cloud computing is quickly becoming a mainstay for many technology companies today because of its superior flexibility, accessibility, and capacity compared to traditional online computing and storage methods. […]

By |November 12th, 2014|ISO 27002, News & Events, Uncategorized|Comments Off on 27 Data Security Experts Reveal The #1 Information Security Issue Most Companies Face With Cloud Computing & Storage