Services
Security Strategy
Integrations
Cyber Forensics
Compliance Consulting
Security Engineering
About
About Us
Resources
Blog
Contact Us
Services
Security Strategy
Integrations
Cyber Forensics
Compliance Consulting
Security Engineering
About
About Us
Resources
Blog
Contact Us
Tag
data protection
// this is the search and dropdown stuff //
Search posts
Search
Select a topic
antivirus
artificial intelligence
audits
BCP
best practices
botnet
Breach
Business Continuity
career planning
CFO
CISO
college grads
compliance
Covid-19
CrowdStrike
cyber security
cyber security hiring
cybercrime
cybersecurity
data compliance
data protection
data recovery
debt ceiling
default
Disaster Recovery
DPF
DR
Employment
EULA
fintech
forensics
Furloughed
government
Growth
Hiring
Hiring Process
hygiene
infosec tools
insider threat
integration
internet of things
internships
Job hunt
Job Post
Job Search
MFA
Mobile Device Management
motivation
motivational
multifactor
national security
News
optimization
Organization
passwords
personal data
phishing
product security
Quality Candidates
ransomware
Recruiters
References
Resume
risk management
SciFi
security
security strategy
self-help
SIM swap
social media
Sourcing
staffing
STEM
students
summer camp
Tabletop Exercises
terms and conditions
Unemployed
VPN
zero trust model
April 29, 2024
How Safe Is Open Source? Lessons Learned from the XZ Utils Vulnerability
On March 29, a Microsoft Security researcher identified a piece of malicious code that was embedded in a tiny little...
Timothy Marsh
All Content
,
Security News
cyber security
,
data protection
,
News
0
February 1, 2024
That Social Media Quiz Could Be a Security Risk to Your Company
Quizzes on social media may be a security risk to your company. Organizations need policies and best practices to prevent...
Timothy Marsh
All Content
best practices
,
cyber security
,
data protection
,
social media
0
January 11, 2024
Mobile Device Management Best Practices for 2024
An MDM solution helps ensure devices with access to company data are secure and meet any necessary regulatory or compliance...
Timothy Marsh
All Content
best practices
,
cyber security
,
data protection
,
Mobile Device Management
0
December 21, 2023
Iran-Linked Hackers Attack U.S. Infrastructure
An Iran-linked hacking group called CyberAv3ngers breached a U.S. water treatment facility, signaling rising security risks for U.S. infrastructure
Timothy Marsh
All Content
,
Security News
Breach
,
cyber security
,
data protection
,
national security
0
September 26, 2023
Disaster Recovery Best Practices That No One Talks About
This guide provides best practices for managing your business continuity (BC) and disaster recovery (DR) plans to protect your business
Timothy Marsh
All Content
,
Security News
best practices
,
Business Continuity
,
cyber security
,
data protection
,
Disaster Recovery
0
September 21, 2023
A Beginner’s Guide to Ransomware Attacks
Ransomware attacks are the number one security threat for companies. It’s critical to know how to respond to ransomware and...
Timothy Marsh
All Content
,
Security News
cyber security
,
data protection
,
security strategy
0
September 7, 2023
What Is DPF and Why US Companies Need to Care
On July 10, 2023, the European Union adopted the new EU-US Data Privacy Framework (DPF) program, quickly dubbed the ‘adequacy’...
Timothy Marsh
All Content
,
Security News
cyber security
,
data compliance
,
data protection
,
DPF
0
May 1, 2023
Is Your Backup Solution Adequate?
With AI writing ransomware and entrepreneurs selling ransomware kits on the dark web to enterprising threat actors, odds are pretty...
Timothy Marsh
All Content
,
Security News
best practices
,
cyber security
,
data protection
,
data recovery
,
security
0