Monthly Archives: November 2020

Why CISOs Need Broader C-suite Support

Generally, the chief information security officer (CISO) is thought of as the top executive responsible for information security within organizations. However, in today’s remote work environment, the need to expand security beyond one department or the responsibilities of CISOs is more important than ever. Due to the pandemic, the physical [...]

By |2020-11-27T17:52:24-04:00November 30th, 2020|cyber hygiene, Cyber Security, IT, TSVMap|Comments Off on Why CISOs Need Broader C-suite Support

Employee Education: Cybersecurity Weakness

Apricorn announced new findings from a Twitter poll exploring the data security and business preparedness for remote working during the pandemic. More than 30% of respondents singled out employee education as being the biggest area companies needed to make changes to improve cybersecurity. The employee poll was issued over six days [...]

By |2020-11-16T12:46:29-04:00November 16th, 2020|cyber hygiene, Cyber Security, IT, News, Technology|0 Comments

Healthcare IT Security During the Pandemic

IT Security During a Pandemic Healthcare providers remain firmly focused on dealing with the global pandemic, juggling the often-conflicting demands of providing care while keeping patients and staff safe. The financial impact of the pandemic has left many providers on the brink of bankruptcy amid falling patient visits, deferred elective [...]

By |2020-11-09T11:01:16-04:00November 9th, 2020|Cyber Security, IT, News, Technology, TSVMap|0 Comments

Zero Trust Network: Five Steps to Implement

Zero Trust Networks While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security agendas. The COVID-19 pandemic has driven mass remote working, which means that organizations’ traditional perimeter-based security models have been broken up, in many [...]

By |2020-10-28T12:57:46-04:00November 2nd, 2020|Cyber Security, IT, News, Technology, TSVMap|Comments Off on Zero Trust Network: Five Steps to Implement
Go to Top