<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Foresight 2020: Establish Your Security Baseline

As we look ahead to 2020, cyber threats will continue to be a top concern for enterprises small and large alike. The[…]

Political Tensions Trigger Cyber Warfare

During political unrest, an invisible army is hard at work vying to hack into computer systems with the aim of[…]

Mobile Devices: A look at security threats

In today’s connected world, our growing reliance on mobile devices and the internet is so pervasive that a simple[…]

Tech Leaders and Enthusiasts Unite at ITPalooza 2019

On Thursday, Dec. 5, 2019, South Florida’s technology community gathered for a day of learning and networking at the[…]

OCR Priorities for 2019-2020

In the recent HIPAA conference organized by the Office for Civil Rights (OCR) and National Institute of Standards and[…]

How a cyber range helps IT security teams in getting ready for a cyber attack

Imagine a team of IT security professionals connecting to a simulated security environment, when suddenly one of them[…]

Does Your Business Need to Comply with The California Consumer Privacy Act?

When the European Union’s General Data Protection Regulation (GDPR) came into effect, the stipulations of this act had[…]

How to prevent a communications breakdown between the IT Security Team and the C-Suite/ Board of Directors?

This blog post was first published on December 6, 2016, but has been updated in August 2019 to reflect some new high[…]

8 Questions Your Board Will Ask About Your Cybersecurity Program

Cybersecurity coverage is a critical concern for every modern business. Whether you're a growing company or an[…]

Medical Device Security Risks: What Healthcare institutions can do

Medical devices, just like any other Internet of Things (IoT) object, are prone to hackers. These hacks can get[…]
Subscribe to our Blog!