Category: Uncategorized

Five Key Aspects of The GDPR

Effective beginning May 25, 2018, the General Data Protection Regulation (GDPR) is set to replace the Data Protection Directive.  This is the first crucial and much needed change to EU…

Read more arrow_forward

Phishing Scams and How to Avoid Them

Phishing attacks have become a common occurrence, targeting both individuals and companies. This social engineering tactic used by cybercriminals, takes advantage of human interaction to gather information about a person,…

Read more arrow_forward

FFIEC Risk Profile

The growing threat to cybersecurity has prompted the Federal Financial Institutions Examination Council (FFIEC) to develop a Cybersecurity Assessment Tool for banking institutions to assess their risks and cybersecurity readiness….

Read more arrow_forward

CIS Critical Security Controls

CIS Critical Security Controls specifies and recommends the appropriate actions for organizations to take to improve their critical infrastructure. Although organizations are taking preventative measures and securing their networks, systems…

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.