<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Security Policies: It’s a Dirty Job, But Somebody’s GOT to Do It!

Security policies and procedures reduce risk and are the foundation of a compliant cybersecurity program Of the dozens[…]

Cybersecurity Issues Can Impact Patient Care

How often do we hear a provider say – “My priority is my patient, I don’t have time for other things”. Well, it is a[…]

Measure the Effectiveness Of Your Cybersecurity Awareness Program

Nowadays, a lack of measurement is one of the main culprits of why many organizations fail on their security front. If[…]

CFOs and Cybersecurity

Data breaches cost companies millions per year. As a matter of fact, in 2019, the average cost of a data breach was an[…]

Smishing, Vishing, Spear-phishing - why these types of cyber attacks happen and what can you do

Most of the data breaches we hear about on the news are executed to extract money or personal information from its[…]

Microsegmentation - Protect your internal network

What is Microsegmentation? Microsegmentation is a method of heightening network security by logically splitting up[…]

How to prevent a communications breakdown between the IT Security Team and the C-Suite/ Board of Directors?

This blog post was first published on December 6, 2016, but has been updated in August 2019 to reflect some new high[…]

Can Your Business Benefit From A Part-Time CISO or VCISO?

Can your business benefit from a part-time CISO? Table of Contents: A real story of risks found on a site and how this[…]

Top 10 tips to stay secure online while traveling this summer

Summer is the time to enjoy traveling and vacations, but do not be lax with your cyber hygiene and follow these top 10[…]

Phase 3 of NY Cybersecurity Regulation is due by September 1, 2018/ March 1, 2019

This is the third part of a 3-part instructional series from 24By7Security on the New York State Cybersecurity[…]
Subscribe to our Blog!