- compliance
- Cybersecurity
- SSAE
- Regulations
- customer data
- service organizations
- cloud services
- SOC 1
- SOC 3
- data security
- service providers
- SOC 2
- Cybersecurity
- ransomware
- social engineering
- other
- cybercrime
- COVID Fraud
- social engineering testing
- social engineering training
- Cybersecurity
- healthcare
- HIPAA compliance
- PHI
- telehealth
- telemedicine
- Chief information security officer
- CISO
- cyber security
- Cybersecurity
- information security
- Financial
- other
- Board of Directors
- company culture
- executive leadership
- CFO
- Cybersecurity
- network segmentation
- hackers
- segment your network
- DontRiskItSecureIt
- other
- network security
- cyber aware
- Cybersecurity
- cybersecurity 101
- incident response
- other
- risk management
- #backups
- cyber attacks
- Cybersecurity
- offline backup
- ransomware
- DontRiskItSecureIt
- other
- Cybersecurity
- DontRiskItSecureIt
- other
- CMMC
- Cybersecurity Maturity Model Certification
- dod
- SIMPLIFY_CMMC
- Gap Assessment
- DoD Contractors
- CMMC Readiness
- Get ready for CMMC
- cyber attacks
- cyber security
- #CyberAware
- Cybersecurity
- hackers
- ransomware
- phishing
- other
- COVID19 scams
- types of phishing
- cyber security
- Cybersecurity
- network segmentation
- ransomware
- segment your network
- other
- network security
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
October, 27 2020
We live and work in a society that has become extensively regulated. Regulations have evolved over time with the[…]
October, 20 2020
We’re all familiar with the saying that a chain is only as strong as its weakest link. It simply means that the most[…]
September, 29 2020
Currently, the entire globe is experiencing its universal lockdown. With the looming threat of COVID-19, people have[…]
September, 15 2020
Data breaches cost companies millions per year. As a matter of fact, in 2019, the average cost of a data breach was an[…]
September, 8 2020
Segmentation is essential to any network. It is one of the most fundamental things any engineer can implement, and it[…]
August, 25 2020
An incident response (IR) plan is a written document that outlines a set of instructions to carry out in the case of an[…]
August, 11 2020
With the amount of ransomware going around in the state, it would be crazy not to consider some type of backup. Whether[…]
July, 27 2020
As of Nov 2021, CMMC 2.0 was introduced and the information below may not apply in its entirety. The Department of[…]
July, 21 2020
Most of the data breaches we hear about on the news are executed to extract money or personal information from its[…]
July, 14 2020
What is Microsegmentation? Microsegmentation is a method of heightening network security by logically splitting up[…]