Article Online Training
Is Your University’s Information Security and Compliance Training Effective?
A recent EDUCAUSE poll identified the needs and challenges higher education institutions are facing with their security awareness training programs. Learn how CampusGuard's hands-on approach helps higher ed institutions make their Security Awareness Training program successful and impactful.
Article NIST Framework
NIST SP 800-171 Series: 3.14 System and Information Integrity
Read our final article in a 14-part series on NIST Special Publication 800-171 Rev. 2, focusing on System and Information Integrity. Prevent unauthorized access and changes by identifying and responding to detected security threats.
Article PCI DSS
PCI DSS v4.0: An Open Letter to PCI Third-Party Service Providers
As your organization finalizes migration plans for moving to PCI DSS version 4.0, vendor oversight should be a top priority. Use our templated letter to communicate with your vendor list now to ensure they are on track to meet new PCI DSS v4.0 requirements.
Infographic Penetration Testing
To Test or Not to Test
The best way to find out if your security tools and network configurations are effectively protecting your organization’s systems and data is through a comprehensive penetration test. Here are 10 reasons your organization should consider conducting a network penetration test sooner rather than later.
Article PCI DSS
Don’t Wait to Talk to Your Leadership Team about New PCI DSS v4.0 Requirements for Third-Party Relationships
Now is the time to officially inform and prepare senior leadership and your procurement/legal teams for possible challenges that may arise regarding third-party vendors with the upcoming migration date for PCI DSS v4.0.
Article Incident Response
8 Reasons to Schedule a Tabletop Exercise
Is your organization prepared if a cyberattack was to occur? Performing a tabletop exercise is an important step in testing your current incident response plan and identifying additional mitigation and preparedness needs before a cyberattack occurs.