Article Working Remotely
9 Security Best Practices for Remote Workers
Employees that are working from home leave your organization's network vulnerable to cybersecurity attacks. Remote workers can follow these guidelines to ensure they are protecting your information security posture from their home office.
“a lack of compliance could mean nothing at all – until a data breach occurs”
Edward Ko, the Director of Information Security Services at CampusGuard sits down with Cybernews to discuss the state of cybersecurity in education, government, and healthcare and what challenges they face.
Article Third-Party Service Providers
The Lifecycle of Third-Party Vendor Management and Security Assessments
While you may be outsourcing services and related responsibilities, the responsibility for the associated risk will always remain with your organization, so it is critical to carefully vet all vendors to ensure they are not creating security risks to your organization’s sensitive data.