Should my business consider browser isolation?

Should my business consider browser isolation?

Browser isolation is a cybersecurity model that physically isolates an internet user’s browsing activity away from their local networks and infrastructure. Browser isolation technologies approach this model in different ways, but they all seek to achieve the...
SOC2 for Small Businesses

SOC2 for Small Businesses

More and more we see small businesses being asked by their clients for some sort of assurance that the data shared with them is kept secure and private. Many times a SOC 2 certification is being requested.  If this happens to you (or your client), the question is...
National breach notification law would usurp patchwork of state laws

National breach notification law would usurp patchwork of state laws

A bill is pending to amend the Gramm-Leach-Bliley Act (GLBA) to include a national data breach notification law that would supersede the various state laws that now apply to the financial sector. This initiative has the support of the American Bankers Association...
Zero Trust Networks

Zero Trust Networks

What is a zero trust network? Traditionally networks were built for the purpose of communication and collaboration. Due to the increasing cyber threat and the ability of criminals to exploit this openness it has grown increasingly necessary that the networks be...
Higher education one of the worst sectors at handling cyber attacks

Higher education one of the worst sectors at handling cyber attacks

The higher education sector ranks highest among the worst business sectors for handling cyberthreats, with 73% of organizations taking three or more days to apply a patch.—EfficientIP Report released  9/10/2018 The higher ed sector is an attractive target for hackers...