Blog

  • Why a FAIR Assessment can Lower Your Cyber Risk

    Why a FAIR Assessment can Lower Your Cyber Risk

    As IT departments around the world modernize, hackers are also modernizing and finding new points of entry into what used to be fully secure systems. To combat these threats, Jack Jones and other cybersecurity experts developed the Factor Analysis of Information Risk (FAIR) assessment.

    (more…)

  • How Privacy Shield Certification Protects Your Brand

    How Privacy Shield Certification Protects Your Brand

    The EU US Privacy Shield is the latest in data protection frameworks to manifest since the implementation of the GDPR. In an agreement between Europe and the United States, to foster positive transatlantic trade, the framework has been developed to facilitate the easier transfer of personal data from the EU to the US.

    (more…)

  • Top 5 Ways COVID-19 Will Change Cybersecurity

    Top 5 Ways COVID-19 Will Change Cybersecurity

    The COVID-19 global pandemic has already changed the way business is done. Face-to-face interactions are rare. Instead, now most meetings are conducted online or via the telephone. Consumers are purchasing more online than in brick-and-mortar stores and remote employees are now the “new norm”.

    (more…)

  • Everything You Need to Know About Data Center Security Standards

    Everything You Need to Know About Data Center Security Standards

    A data center is a dedicated space within a building or a group of buildings used to house computer and storage systems. The network systems in a data center are for data processing and distribution. Data centers deliver essential services such as data storage backup and recovery, data management, and networking.

    (more…)

  • Top 5 Industries that Need Privacy Shield Certification

    Top 5 Industries that Need Privacy Shield Certification

    When thinking about whether your company would benefit from Privacy Shield certification the most important question to answer is: is my company under the jurisdiction of the Federal Trade Commission (FTC) or the Department of Transport (DOT)? If the answer is yes, then the Privacy Shield could be of real benefit to your organization when dealing with the transatlantic transfer of personal data from the European Union to the U.S.

    (more…)

  • Pen Test Certification Process: Steps to Follow

    Pen Test Certification Process: Steps to Follow

    Just as schools and workplaces test fire alarm systems throughout the year, companies implement penetration testing, or pen testing, to confirm that the security protocols sufficiently protect the network, systems, and facilities to the greatest extent. Pen testing isn’t just a means of bolstering shareholder confidence or fulfilling industry standards; rather, it’s also a way of preventing attacks through a proactive security policy. Looking to learn more about the pen test certification process? Our experts can help. Read on to learn more now!

    (more…)

  • How is Privacy Shield Different from GDPR?

    How is Privacy Shield Different from GDPR?

    The EU-US Privacy Shield program was launched in early 2019 primarily as a response to two external causes; the ruling by the Court of Justice of the European Union (CJEU) which invalidated the Safe Harbour program in 2015, and the enactment of the General Data Protection Regulation (GDPR) introduced by the European Union in 2018.

    (more…)

  • What Does NERC CIP Stand For?

    What Does NERC CIP Stand For?

    The North American Electric Reliability Corporation (NERC) is a non-profit international regulatory authority that monitors large electric power stations and ensures the safety of Bulk Electric System (BES) in America, Canada and parts of Mexico.

    Given the increased sophistication of cybercriminals, it’s important to not only protect the physical assets of organizations, but also the data and information assets. A breach of any of these assets can have catastrophic effects on the safety of both IT infrastructure and human lives.

    What does NERC CIP stand for and how does it apply to cybersecurity? Find out everything you need to know from the experts at RSI Security.

    (more…)

  • Top Work From Home Cybersecurity Best Practices

    Top Work From Home Cybersecurity Best Practices

    Due to recent circumstances, life has changed. This includes how and where employees work. Remote employees aren’t new. For some organizations, the majority of their workforce is off-site. Many other companies are scrambling. This is a new environment for them. Suddenly, their employees are working remotely and this leaves questions about cybersecurity.

    (more…)

  • Top Data Center Security Threats of 2020

    Top Data Center Security Threats of 2020

    Every year, businesses incur substantial losses of money, customers, and reputation due to cyber-attacks. Data and infrastructure security have always been a major concern for all businesses and now, with IT systems moving to cloud platforms, they have taken center stage on all IT agendas.

    (more…)