| Apr 30, 2020 HIPAA Encryption Requirements & Standards For 2022 Learn everything you need to know about successfully complying with HIPAA encryption standards and requirements to protect ePHI.
| Apr 28, 2020 Remaining PCI compliant while reopening following COVID-19 Businesses returning to normal operations and that handle credit cards must keep their eye on remaining PCI compliant while reopening following COVID-19.
| Apr 28, 2020 How to know if your MSSP is equipped to support you through a breach It’s crucial your MSSP is equipped to support you in the case of a breach by being able to pivot from normal operations to incident response on your behalf.
| Apr 27, 2020 New Spear Phishing Attacks use fake O365 link to gain access Avertium reports on new spear phishing attacks by a well-known threat actor involving a macro infested Word document using a fake Office 365 link.
| Apr 24, 2020 Why Pen Tests are key to a Robust Incident Response Plan Security incidents are expensive and timely detection is key. You can develop a more relevant IR plan by assessing vulnerabilities through a pen test.
| Apr 14, 2020 How to protect workers from increased phishing attacks during COVID-19 Protect your workers from increased phishing attacks during COVID-19 by teaching them phishing scam indicators, creating a safe reporting culture, and more.
| Apr 13, 2020 CVE-2020-3952 VMWare vCenter Software Vulnerability This report is about the CVE-2020-3952 VMWare vCenter software vulnerability caused by improper access controls affecting the VMware Directory Service.
| Apr 8, 2020 AT&T Cybersecurity names Avertium 2019 North American Partner of the Year Avertium is named AT&T Cybersecurity's 2019 North American Partner of the Year. The award recognizes Avertium for outstanding growth in North America.
| Apr 7, 2020 3 Ways to stay PCI Compliant during the COVID-19 Pandemic Businesses transitioning to support remote work environments to remain operational need to stay PCI compliant during the COVID-19 pandemic. Learn how.
| Apr 6, 2020 Stop using online collaboration tools until you read this This article covers online collaboration tools security and explains the associated risks and best practices for protecting your workers.