Category: Security Program
Cybersecurity Maturity Model Certification (CMMC) – An Introduction
Are you a government contractor trying to find out what is the Cybersecurity Maturity Model Certification (CMMC), and how it will affect your company? The…
Why Cyber Breach Readiness is Critical
9 in 10 businesses will experience at least 1 cyber incident this year with just over 50% resulting in a data compromise. Regulatory and compliance…
Online Social Media Policy: Best Practices and Template
What is a social media policy? The growing importance of online social media networks as a communication tool is highly recognized. The good social media…
Internet Use Policy: Best Practices and Template
This article provides some insights and guidance on the best practices when developing an Internet Use Policy. You can you the information in this article…
Acceptable Use Policy: Best Practices and Template
An acceptable use policy or access agreement should been adopted to ensure uniform and appropriate use of an organization’s network, computer, information assets, and other…
Access Control Best Practices
Why is access control important? Without proper access control, unauthorized users could obtain confidential information and misuse it, and authorized users could fail to follow…
Mobile Device or BYOD Security Best Practices
This article will provide some guidance and best practices for the use of, and security for, remote access and mobile device technology (e.g. BYOD) that…
How To Prevent Application Vulnerabilities and Breaches
Any applications developed internally or outsourced should follow secure coding practices to prevent common vulnerabilities and potential data breaches. The application’s design and implementation should…