AI is moving faster than most organizations can keep up with. New tools are being rolled out weekly. Internal teams are adopting them organically and often without oversight. Meanwhile, regulators around the world are racing to catch up.
by Felicia Gopi, on Aug 5, 2025 4:38:43 PM
AI is moving faster than most organizations can keep up with. New tools are being rolled out weekly. Internal teams are adopting them organically and often without oversight. Meanwhile, regulators around the world are racing to catch up.
by Maria Catricala, on Apr 11, 2024 11:53:29 AM
As our world becomes increasingly interconnected, the digital landscape is growing at an exponential rate. This has created a pressing need for robust cybersecurity solutions to protect our sensitive information from malicious attacks. From the protection of personal data to safeguarding critical business assets, cybersecurity stands as the barricade preserving the integrity and confidentiality of information. As threats evolve and become increasingly sophisticated, the necessity for a comprehensive defence strategy encompassing 360-degree protection and risk management emerges as paramount. In this blog, we will explore diverse cybersecurity solutions, weaving in the crucial elements of holistic protection and risk mitigation.
by Maria Catricala, on Mar 7, 2024 10:19:42 AM
The NIST Cybersecurity Framework was updated last week. This is the first major update to the framework since it was first introduced in 2014. The framework has helped organizations by providing them with guidance on understanding, evaluating, and communicating cybersecurity risks.
by Maria Catricala and Dave Millier, on Sep 21, 2022 10:46:41 AM
by Maria Catricala, on Jul 29, 2022 11:17:59 AM
Compliance means: to conform by fulfilling requirements. In cybersecurity, compliance refers to fulfilling specific cybersecurity requirements, outlined by a governing body. In other words, government organizations, committees, and regulatory boards develop requirements (together called standards) outlining a baseline of cybersecurity protocols. For example, a requirement might be that organizations MUST have password restrictions in place, such as length, repetitiveness, and level of difficulty.
by Maria Catricala, on Jul 6, 2022 10:19:14 AM
Is there such as thing as “just enough” cybersecurity? This is a question businesses have to ask themselves. Most organizations know that they need cyber security, but they don’t know how much security they need, they don’t know what to secure, or how to do it.
by Maria Catricala, on Jun 29, 2022 9:13:28 AM
The Cybersecurity threat landscape is constantly changing. It makes sense that your cybersecurity policies and procedures need to be updated regularly to address these changes. Couple that with the quickness of how the workplace is also evolving shows the need to update policies often.
by Maria Catricala, on Jun 15, 2022 11:32:40 AM
The biggest area of economic growth during the COVID-19 pandemic was eCommerce. A press release issued by ACI Worldwide reported that most retail sectors saw a 74% rise in online sales in March of 2020 compared to the same period in 2019. This growth is great; however, it could lead to issues if online businesses do not take the appropriate cybersecurity measures. The following 3 cybersecurity issues can adversely affect your eCommerce business.
by Maria Catricala and Dave Millier, on Oct 13, 2021 9:49:47 AM
They say a fence is only as strong as its weakest link, that holds true with cyber security as well. With most companies outsourcing services to companies like yours (and ours!), what we do to protect ourselves directly impacts the overall cyber security postures of our customers.
by Maria Catricala and Dave Millier, on Oct 8, 2021 9:39:58 AM
Privacy and security go hand in hand. Cyber security focuses on protecting the information from unauthorized access, while privacy focuses more on protecting the contents of the information and ensuring it isn’t accessed or shared inappropriately. Both businesses and individuals have an expectation of privacy when they trust another business with their data.
Get the latest information and cyber security news here!