Information Security

  • Photo of engineer with server working on IT infrastructure challenges

The biggest IT challenges for small businesses in 2023

2023-02-14T12:09:55-05:00

In Stephen King’s book IT, the titular antagonist says, “I am everything you ever were afraid of.” How very prescient of King. Nearly three decades later, a different IT—information technology—can be what keeps small business owners up at night. Everyone needs it, few understand it, and even fewer like investing in it. But failing to pay attention to and investing in it can, as Pennywise the Clown said, become “every nightmare you ever had.” Here are common IT challenges and tools that can help you overcome them.

The biggest IT challenges for small businesses in 20232023-02-14T12:09:55-05:00
  • Abstract illustration of toxic data and security insights engineers

Toxic data: You own it…unless you can prove you don’t

2023-01-30T15:22:54-05:00

Data is a valued asset that can propel growth. How you collect and store it can create a risk profile you don’t fully understand—with potentially negative consequences. That’s why you need to assume you have toxic data until you can prove you can’t.

Toxic data: You own it…unless you can prove you don’t2023-01-30T15:22:54-05:00
  • Photo of professor depicting cybersecurity basics doesn;t have to be complicated.

Remember the basics: Cybersecurity 101

2022-12-06T12:47:09-05:00

As protecting data becomes more challenging and complex, with new tools being introduced to the market seemingly daily, three simple, core cybersecurity basics remain the best weapon to combat threats.

Remember the basics: Cybersecurity 1012022-12-06T12:47:09-05:00
  • Information security team reviewing governance pyramid

Three Elements that Complete the Governance Pyramid

2023-01-30T14:40:35-05:00

The governance pyramid is built bottom-up with policy, standards, process, procedures, and guidelines. To be effective, the structure needs to be organized, consistent, and aligned with to policy and business need.

Three Elements that Complete the Governance Pyramid2023-01-30T14:40:35-05:00
  • Photo of CISO discussing security as a process and reviewing information classification with team

What is SAAP? It is Security as a Process

2023-01-30T14:16:13-05:00

Security as a Process (SAAP) and the classification of information is fundamental to information security. This article, the second in a three-part series, looks at the "how" of information security and why it is so important.

What is SAAP? It is Security as a Process2023-01-30T14:16:13-05:00
  • Photo of CISO discussing security as a process and reviewing information classification with team

The Secrets Behind Information Security Organization

2023-01-30T14:39:33-05:00

Information security is a multifaceted field, covered with tempting baubles and sharp thorns. However, the unifying framework upon which the whole field is suspended is governance. This article, the first in a three-part series, looks at standards and policy—from why policies are needed and what needs to be done to support them.

The Secrets Behind Information Security Organization2023-01-30T14:39:33-05:00
Go to Top