Vulnerability Scanning

Vulnerability Scanning

Data breaches are an all-too-common occurrence. According to Security Magazine, there were 4,145 publicly disclosed breaches in 2021, exposing more than 22 billion records. The consequences of a breach range from financial losses and significant reputational damage to...
Small Business Cybersecurity

Small Business Cybersecurity

Are you a small business owner who doesn’t make cybersecurity a high priority? You’re not alone. According to the May 2022 CNBC/SurveyMonkey Small Business Survey, only 5% of small business owners believe cybersecurity is their most urgent threat. However,...
What’s Required for ISO 27001 Certification?

What’s Required for ISO 27001 Certification?

Table of Contents: What is ISO 27001 Who Wrote It and Why? What are the Benefits? How to Get ISO 27001 Certified What Requirements are Included? Clauses of the ISO 27001 Standard Annex A – ISO 27001 Controls Getting ISO 27001 Certified   In an increasingly...
Here to Stay — ISO 27001

Here to Stay — ISO 27001

The risk-based, top-down approach of ISO 27001 has taken a back burner to CMMC/NIST conversations over the past few months. With headlines and news focusing on the requirements of the DoD for contract security, some organizations have been forced to shift focus in...
Cybersecurity Tips for Small Business

Cybersecurity Tips for Small Business

The risk of cyber-attack in small businesses increases with each passing year. As we make our way into the new decade, it’s no longer optional to employ security practices for your networks and data – it’s now a requirement of the times. A recent report by CNBC...
Smartlink Execution Complete Please note that the CORE Application window may have fallen behind this window and your Email client. Close this Message