CMMC
Posted in Checklist Compliance Program Risk Management Security News Security Program

Cybersecurity Maturity Model Certification (CMMC) – An Introduction

Are you a government contractor trying to find out what is the Cybersecurity Maturity Model Certification (CMMC), and how it will affect your company? The…

Continue Reading... Cybersecurity Maturity Model Certification (CMMC) – An Introduction
Posted in Best Practices Checklist Compliance Program GDPR Latest Data Breaches Security Program

Why Cyber Breach Readiness is Critical

9 in 10 businesses will experience at least 1 cyber incident this year with just over 50% resulting in a data compromise. Regulatory and compliance…

Continue Reading... Why Cyber Breach Readiness is Critical
Online Social Media Policy
Posted in Best Practices Compliance Program Policies & Procedures Security Program

Online Social Media Policy: Best Practices and Template

What is a social media policy? The growing importance of online social media networks as a communication tool is highly recognized. The good social media…

Continue Reading... Online Social Media Policy: Best Practices and Template
Internet Use Policy
Posted in Best Practices Compliance Program Policies & Procedures Security Program

Internet Use Policy: Best Practices and Template

This article provides some insights and guidance on the best practices when developing an Internet Use Policy. You can you the information in this article…

Continue Reading... Internet Use Policy: Best Practices and Template
Acceptable Use Policy Best Practices
Posted in Best Practices Policies & Procedures Security Program

Acceptable Use Policy: Best Practices and Template

An acceptable use policy or access agreement should been adopted to ensure uniform and appropriate use of an organization’s network, computer, information assets, and other…

Continue Reading... Acceptable Use Policy: Best Practices and Template
Access Control Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

Access Control Best Practices

Why is access control important? Without proper access control, unauthorized users could obtain confidential information and misuse it, and authorized users could fail to follow…

Continue Reading... Access Control Best Practices
BYOD Security Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

Mobile Device or BYOD Security Best Practices

This article will provide some guidance and best practices for the use of, and security for, remote access and mobile device technology (e.g. BYOD) that…

Continue Reading... Mobile Device or BYOD Security Best Practices
Application Development Security Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

How To Prevent Application Vulnerabilities and Breaches

Any applications developed internally or outsourced should follow secure coding practices to prevent common vulnerabilities and potential data breaches. The application’s design and implementation should…

Continue Reading... How To Prevent Application Vulnerabilities and Breaches