Categories
IT Security Outsourced IT

Business Resilience Planning

What is Business Resilience Planning? Crisis management and business continuity planning is something that your organization may have engaged with quarterly or even annually pre-pandemic, but it is likely to have become significantly more active since then. Before settling back into complacency, thinking that one “black swan” event is all your organization will ever endure- […]

Categories
Application Security IT Security Outsourced IT

IT Steps for Employee Offboarding

What are Steps to Take for Employee Offboarding? Establishing and following an IT protocol for offboarding employees is a critical, but often overlooked, cybersecurity protection activity. More often than not, an organization cannot predict how/why/when an employee will exit the organization, so having a plan in place that can be applied in any kind of […]

Categories
Government IT Security Outsourced IT

IT Security Risks for National Critical Functions

What are IT Security Risks for National Critical Functions? Whether your organization is public or private, it exists within a complex system where it might a greater role and responsibility in national security than you may have realized. The Cybersecurity & Infrastructure Security Agency (CISA) defines National Critical Functions (NCFs) as, “…functions of the government […]

Categories
IT Security

Secure Web Browsers

What are the Features of Secure Web Browsers? As is the case with many tools and utilities that we use in our daily lives, we often continue to use what is comfortable and familiar, without giving much thought to what other innovations may have arrived on the scene over the years. If this is the […]

Categories
Application Security IT Security Outsourced IT Websites

Secure Coding

How are Web Applications Securely Coded? As organizations become more mindful of the critical role of cybersecurity in their business, they are increasingly interested in web application development with security at the forefront. A savvy developer with a security mindset will engage in coding practices such as the following recommendations from the Open Web Application […]

Categories
Application Security IT Security Outsourced IT

IT Monitoring

What is IT Monitoring? IT monitoring is the process of gathering metrics about the operations of an IT environment’s hardware and software to ensure that the equipment is available and performing to the level expected and necessary to maintain your business. This is achieved by using trends to validate infrastructure updates before applications or services […]

Categories
IT Security Outsourced IT

Enterprise Wi-Fi Network Security

What is Enterprise Network Security? Enterprise network security is the protection of a network that connects the systems, mainframes, and devices within an enterprise. Wireless networks (Wi-Fi) are vulnerable to cyberattacks as they lack many of the robust security tools that secure wired networks, such as firewalls, intrusion protection systems, content filters, and antivirus and […]

Categories
Application Security IT Security Outsourced IT

Security Misconfigurations

What are Security Misconfigurations? Security misconfigurations are a result of security settings not being defined or implemented, and default values are maintained. This typically means that configuration settings do not comply with industry security standards which are critical to maintaining security and reducing risk. Security misconfigurations happen most often when a system administrator or database […]

Categories
Application Security IT Security

Security Risks in Remote Team Productivity Apps

What are the Security Risks of Remote Productivity Apps? Due to the rise in remote working, more of us than ever are utilizing productivity application to facilitate meetings, to collaborate, and to share files and information. While productivity apps such as Slack and Teams have robust security features, there are still many potential vulnerabilities that […]

Categories
IT Security Outsourced IT

Security.txt

What is a Security.txt File? Organizations adopt a wide variety of disclosure policies and cybersecurity practices, but these are often a mystery to the security researchers tasked with informing an organization about security vulnerabilities or data leaks. A common scenario is a security researcher finding sensitive information from an organization for sale on the dark […]