Follow Us:

Trusted Information Security Insights

The True Cost of a Security Operations Center (SOC)

Knowing the true cost of your SOC—including capital, payroll, recurring expenses, and care—prevents wasteful spending and keeps your operation lean. Our dedicated information security experts can show you how careful planning and wise use of resources can keep your data secure and your bottom line healthy—two things previously thought to…

Written by Matthew Wilson

A Virtual Disappearing Act

The Internet has become the world’s largest information exchange. Given a phone number, email address, license plate, LinkedIn Profile, Instagram username, or just about any other single piece of identifying information, and odds are an attacker can find the other pieces. Scary right? The sad part is, we’ve all knowingly…

Written by Matt Barnett

Did You Hear About the 2017 Data Breaches? I See the Future

In the wake of the Yahoo, Equifax, Whole Foods, Sonic Drive-in, Deloitte, Securities Exchange Commission, Viacom, Vevo… all in the last month, btw. I feel confident in predicting the future, there will be another major data breach this year. Ok, so maybe those words aren't as surprising as they once…

Written by Matthew Wilson

New Protection Measures in GDPR: Who it Effects in the European Union

The General Data Protection Regulation 2016/679 (GDPR) is an action passed by the European Parliament, Council of the European Union (EU), and European Commission to unify and strengthen data protection for all individuals and return control of personal data to citizens. Enforceable on May 25, 2018, GDPR replaces Directive 95/46/EC…

Written by Matthew Wilson

Cybersecurity Under 23 NYCRR 500: What it Means to Financial-Service Companies

NY DFS enacted 23 NYCRR 500 to establish cybersecurity requirements for financial businesses in New York State. This regulation seeks to protect industry and consumer from cyberattack—requiring banks and other institutions to safeguard transaction records and consumer data.…

Written by Ron Schlecht Jr.

GO BEYOND THE BASICS

Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics