Security Elements Blog

Security Elements Blog

Blogs by Topic

All General Security NewsCompliancePCIHIPAA
Application Whitelisting to Stop Malware

Using Application Whitelisting to Stop Malware

August 13, 2020

When Avertium’s CyberOps Center of Excellence analysts’ map the attacks we see against the MITRE ATT&CK framework, we find that the most common Initial Access technique used today is Phishing....

Read More
Automate PCI DSS Requirement 11.2

Make PCI Compliance Easier; Automate PCI DSS Requirement 11.2

August 11, 2020

One of the key tenets of a good cybersecurity program is using security in layers and including automated tools to assess defense status. Automated tools are the only way to...

Read More
Least Privilege: Minimizing Permissions to Improve Cybersecurity

Least Privilege: Minimizing Permissions to Improve Cybersecurity

August 6, 2020

Employing least privilege access by minimizing permissions for end user account access is an important aspect of building a cybersecurity program. Admittedly, assigning appropriate access levels and setting up account...

Read More
SOC 2 Type 2 Trust Services Criteria

How to Apply SOC 2 Type 2 Trust Services Criteria to Your Business

August 4, 2020

As a technology-based service organization, undergoing a SOC 2 Type 2 audit may be required by a customer or could be helpful for demonstrating your organization’s capabilities and differentiating your...

Read More
Demystifying Zero Trust Network Security

Demystifying Zero Trust: What Is Zero Trust Security, and How Can It Bolster Your Environment?

July 30, 2020

The zero trust security model delivers exactly what the name promises: it’s an IT security concept that specifies no access is allowed until the successful completion of authentication and authorization...

Read More
SOC Audit Report Basics

SOC Audit Report Basics: The What, Why, Who and How

July 28, 2020

Companies have learned the hard way that vendor and partner data should be considered when hardening their security program. If your organization provides outsourced services to another company, you may...

Read More