| Aug 4, 2020 How to apply SOC 2 Type 2 Trust Services criteria to your business This article explains the SOC 2 Type 2 Trust Service Criteria (TSC) for SOC audit reports and how to apply them to your business.
| Jul 30, 2020 Demystifying Zero Trust: What is Zero Trust Security, and how can it bolster your environment? What is Zero Trust security? How can it bolster your information security environment? Learn if a zero trust security model is right for your organization.
| Jul 28, 2020 SOC Audit Report Basics: The What, Why, Who and How Learn SOC audit report basics: What is a SOC audit report, what's the difference between a SOC 1, SOC 2 and SOC 3 report, Type 1 vs. Type 2, and more.
| Jul 27, 2020 SIGRed "Wormable" DNS Server vulnerability is critical to address SIGRed, assigned as "wormable" DNS Server vulnerability may allow malicious actor Domain Administrator rights with devastating financial impact.
| Jul 20, 2020 Zoom Client for Windows Vulnerability recently discovered Threat report about a newly discovered Zoom Client for Windows vulnerability that allows a remote attacker to execute arbitrary code on a victim’s computer.
| Jul 17, 2020 Why Root Cause Analysis is Crucial to Incident Response (IR) Performing incident response root cause analysis can help your organization identify outlying factors that may have contributed to a data breach. Read more.
| Jul 15, 2020 How to write a Business Continuity Plan to fit your enterprise How to write a business continuity plan to fit your business, including primary goals, what a BCP includes, and business continuity planning steps.
| Jul 15, 2020 Avertium adds Sophos 2020 MSP Partner of the Year, Americas to List of Partner Awards Avertium Adds Sophos 2020 MSP Partner of the Year, Americas to List of Partner Awards
| Jul 13, 2020 Citrix Vulnerabilities: NetScaler ADC, NetScaler Gateway and SD-WAN WANOP This threat report is about a series of Citrix vulnerabilities within Citrix ADC (NetScaler ADC), Gateway (NetScaler Gateway), and SD-WAN WANOP.
| Jul 9, 2020 Why Patch Management is Important for Cyber Security This post explains strong patch management importance in cyber security, best practices, and how to implement a program that manages risk.