Article

Protecting Your Corporate Website as an Enterprise Risk Management Strategy

Organizations often view their websites as simple business cards that give customers information. Protecting your corporate website as an enterprise risk management strategy can keep your da ...
September 30, 2022
Article

Information Security vs. Cybersecurity: Main Differences

Cybersecurity and information security are often assumed to be synonymous terms. They're not. On the contrary, they have several critical differences that security professionals should under ...
April 4, 2022
Article

Password Management Risks: Protect Your Castle

Love them or hate them, passwords have become part of everyday life - from logging into email accounts to signing up for classes, accessing corporate accounts for work, and much more. We all ...
June 14, 2021
Article

Healthcare Data Security: Why It’s Important

The security of healthcare data doesn't always get the same consideration as other types of cybersecurity. Perhaps that shouldn't be surprising: the stakes in many healthcare facilities are ...
January 13, 2021
Article

Internal Control Review Process

What Is an Internal Control Review Process? Internal control review is a company's process to evaluate the business practices it has designed and implemented to assure that the company achi ...
December 16, 2020
Article

ISO 27001 Firewall Security Audit Checklist

Because of additional regulations and standards pertaining to information security, including Payment Card Industry Data Security Standard (PCI-DSS), the General Data Protection Regulation ( ...
August 27, 2020