Reading Time: 3 minutes Many companies manage their cybersecurity risk with a ‘hide, watch, and react if necessary’ approach. Unfortunately, many fall victim to cyberattacks due to this mentality. They falsely believe if they haven’t yet had a cyber incident, they can...
Reading Time: 5 minutes Data loss happens as a result of a variety of events including accidental damage, deletion, or modification of data, hardware malfunction or failure, local disasters such as fire, flood, or a spilled drink on a computer, lost or stolen devices,...
Reading Time: 3 minutes Calvetti Ferguson co-hosted a webinar focused on cybersecurity challenges in the COVID environment with Dean & Draper Tuesday, August 18, 2020, at 10 – 11 a.m. CDT. Our experts discussed best practices and risks for employees working...
Reading Time: 6 minutes We often get questions from our clients asking about common security issues that we find during engagements. In this article, we want to share with you the top five common issues we encounter and recommendations to help secure your environment....
Reading Time: 5 minutes How much are you willing to pay to get your data back from a ransomware attack? Did you know the average cost for a company to ‘recover’ from a ransomware attack is over $84,000? Keep in mind this average was prior to the global pandemic which...
Reading Time: 6 minutes Managing your vendors can be a time-consuming process. Some larger organizations employ FTEs dedicated solely to vendor oversight and management; others may engage a third-party to execute this function on the organization’s behalf. No matter...
Reading Time: 6 minutes Anyone who has ever been responsible for an organizations’ IT knows of the Catch-22 paradox, those situations with conflicting key requirements that can appear to be at odds with one another. A prime example of this is the balancing act that IT...
Reading Time: 6 minutes In a recent article, we referenced the term “human layer” to describe the employees of an organization and described the importance of remaining vigilant when it comes to providing security training, and then testing whether that training is...
Reading Time: 4 minutes This article is a continuation of the two-part series on common questions about SOC examinations. In this article we will be covering what the process for completing a SOC examination looks like from day one. SOC Readiness Assessment and...
Reading Time: 3 minutes Service organizations have many questions about SOC examinations: Whether they need to have one performed, when would be the right time to pursue it, and what does the process look like from day one. These are complex questions with a lot of...
Reading Time: 5 minutes Our recent article centered on how IT departments can make the most of downtime. In compiling questions from our clients, we noticed that many were from individuals who do not have a technology background. In this article, we are going to...
Reading Time: 5 minutes These past several weeks have produced many challenges for IT organizations across the world. In addition to supporting operations in a truly unprecedented environment, many have had to implement new processes and tools in order to enable a now...