Compliance

How to Regain Trust After a Data Breach
Josh Mayfield
How to Regain Trust After a Data Breach

Data breaches come with a hefty price tag – from IT costs to notification expenses, insurance premiums and operational down time, organizations are very often faced with a financial crisis that can take years to overcome. Shaken consumer confidence only amplifies the hurt. When Equifax announced that they had suffered a data breach in 2017 (along with the fact that the personal information of more than 147 million customers...

READ MORE
How to Evade the Real Holiday Grinch
Josh Mayfield
How to Evade the Real Holiday Grinch

If the holidays have you busy running from one commitment to another, you’re not alone. Dashing out of a year-end budget meeting to your kid’s school production and then back for a departmental holiday party is a painfully common schedule for many right now. While it can be exhausting, the holiday season only comes once a year, so why would you miss any of these get-togethers or unique opportunities?...

READ MORE
The Criticality of Strong Cyber Hygiene
Josh Mayfield
The Criticality of Strong Cyber Hygiene

The more connected we become, the more at risk we are to cyber criminals who are busy looking for a chance to capitalize on our technology dependency. Unfortunately, we’ve seen this breakdown many times – in our hospitals when WannaCry ransomware forced medical personnel to turn away patients and in our local governments when ransomware used by the SamSam group rendered the city of Atlanta incapable of validating arrest...

READ MORE
‘Tis the Season for Predictions – Part One
Josh Mayfield
‘Tis the Season for Predictions – Part One

As people in the U.S. get ready to over-eat their Thanksgiving Day feasts, cheer on their favorite football team and hopefully look back in gratitude on all the good things 2018 has brought them, it’s my habit to also consider what the year ahead may bring. In addition to my favorite team winning the Super Bowl, I also think the security industry is in for a few changes. Here...

READ MORE
How to Track Your Devices, Apps & Data in 3 Steps
Josh Mayfield
How to Track Your Devices, Apps & Data in 3 Steps

Remember when your devices were relatively few, static and accessed data on the network only through a firewall? Barely, right? Those good old days are forever gone as the number of corporate endpoints have multiplied, are sourced from several manufacturers and come with different operating systems. Not to mention users now also access corporate networks from their own devices through applications that are too numerous to count. Likewise, security...

READ MORE