Welcome To Our Think Tank
The ONLY Checklist You Need for Your Preventative Cybersecurity Strategy
The previous post in our Cybersecurity strategy series addressed whether to outsource or keep cybersecurity efforts inside your organization, a critical consideration in building an effective cyberdefense strategy. To refresh your memory: An effective cybersecurity strategy is divided into 7 characteristics, which categorize your strategy’s various entities and functions. These characteristics and independent functions can […]Read Article
Thinking of Outsourcing Your Cybersecurity Strategy?… Read this First!
Last week, we analyzed the value and level of threat among the data your organization processes. The analysis allowed you to determine how susceptible this data and therefore, your business could be to a cyberattack. This crucial exercise completed phase 1 of building a cybersecurity strategy: Phase 2 begins with building a solid foundation for your cybersecurity strategy that, when finished, will best fit your organizational needs. A solid foundation rests on determining whether to: Keep all […]Read Article
How Vulnerable Are You to Cyberthreats?
Every company, regardless of size, industry, or location, needs a cybersecurity game plan. Whether you’re a mom and pop shop or a top shelf fortune 500 enterprise, your organization is vulnerable to the growing number of cyberthreats in the digital space. To combat current cyberthreats, inevitable cyberattacks, and potential data breaches, you MUST have a predefined, systemic approach. This approach should encompass […]Read Article
The 6 Most Common Cyberthreats to Know
In a previous post, we discussed the prominent dangers lurking within the cyber arena. In case you missed it, here’s what you need to know: WHAT: Data Breaches. TechTarget defines a data breach as “an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally […]Read Article
The New Battlefield: Cyberwarfare
“We believe that data is the phenomenon of our time. It is the world’s new natural resource, it is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true—even inevitable—then cybercrime, by definition, is the greatest threat to every profession, every industry, every company in […]Read Article
Cybersecurity Toolkit: Hashing 101
Implementing eSignatures is a true digital transformation for your company. While pen-and-paper may seem like the safer route, old-school signatures are actually easier to replicate and more difficult to verify than their electronic counterparts. eSignatures offer a fast, simple, and secure solution to guaranteeing your document gets signed when you want and by whom you […]Read Article
The Cloud Isn’t for Everyone: A Case for On-Premise Electronic Signature
While the adoption of cloud usage continues to accelerate (greater than two out of three enterprises are incorporating the cloud today), a report issued by U.K.-based communications services provider BT Group indicates that IT decision makers’ confidence in the security of the cloud is at an all-time low. Moreover, a report issued by telecomm company […]Read Article
Understanding NIST Standards When Dealing with Electronic Authentication
by Britni Zandbergen – IDology The National Institute of Standards and Technology (NIST) is not only one of the nation’s oldest physical science laboratories, it is also a non-regulatory agency of the United States Department of Commerce. From nanotechnologies to the world’s largest and most complex creations, NIST conducts research in support of a […]Read Article
How Legal Are Electronic Signatures?
Originally posted on Paperless Kitchen Blog 29 April 2013 Earlier in the month, we shared the findings of a survey conducted by Adobe that showed that paperless contracts continue to remain out of reach for most companies. One reason why many companies are wary of electronic contracts is because of signatures. Companies worry that if […]Read Article