If your business processes data belonging to residents of California, and you meet certain size or revenue requirements, you must abide by the California Consumer Privacy Act (CCPA). It doesn’t…
-
-
Identity theft affects millions of people every year. It carries a high cost for both individuals and organizations, so regulations require many financial institutions and creditors to protect account holders…
-
Webinar Recap: ROI with a HITRUST Certification – Measuring the Benefits
by RSI Securityby RSI SecurityRSI Security hosted a webinar on measuring the ROI and benefits of HITRUST certification. Tom Glaser, a Security Assessor with RSI Security, led the presentation.
-
If your organization works with government entities as a contractor, you probably have some questions about NIST SP 800-171, CMMC, or even NIST SP 800-53 compliance. Below, we’ll answer questions…
-
Protecting network resources and data from unauthorized access, compromise, and destruction is an organization-wide priority in today’s highly connected world. The role of a Chief Information Security Officer (CISO) is…
-
One of the most essential components of any cyberdefense program is a powerful firewall configuration. Two ways to ensure your firewalls and web filters are operating at maximum capacity involve…
-
Cybersecurity has never been more indispensable than it is today; the internet is shapeshifting every year, not over decades. Social engineering scams exploit both the vulnerabilities that arise from these…
-
Information Security Program Development: Top Strategies and Solutions
by RSI Securityby RSI SecurityA comprehensive information security program utilizes multiple strategies, solutions, and layers to achieve a level of security that sufficiently protects against modern hackers, viruses, and other cybersecurity threats. Via comprehensive…
-
What is a Pretexting Social Engineering Scam? And How Can You Prevent It?
by RSI Securityby RSI SecurityYour organization may have sound policies for information and technology use, but threat actors will always go for the weakest surface of the cybersecurity program: the workforce. According to Verizon’s…
-
Is Penetration Testing Compulsory for My Business? Pen Testing Requirements, Explained
by RSI Securityby RSI SecurityPenetration testing, also known as pen-testing, makes it easy to uncover exploitable vulnerabilities and other flaws in your network security. But with new threats emerging on a daily basis, some…