The ONLY Checklist You Need for Your Preventative Cybersecurity Strategy

cybersecurity strategy checklist

The previous post in our Cybersecurity strategy series addressed whether to outsource or keep cybersecurity efforts inside your organization, a critical consideration in building an effective cyberdefense strategy.  To refresh your memory: An effective cybersecurity strategy is divided into 7 characteristics, which categorize your strategy’s various entities and functions. These characteristics and independent functions can… Read more »

Thinking of Outsourcing Your Cybersecurity Strategy?… Read this First!

Outsourcing Cybersecurity Strategy

Last week, we analyzed the value and level of threat among the data your organization processes. The analysis allowed you to determine how susceptible this data and therefore, your business could be to a cyberattack. This crucial exercise completed phase 1 of building a cybersecurity strategy:  Phase 2 begins with building a solid foundation for your cybersecurity strategy that, when finished, will best fit your organizational needs.   A solid foundation rests on determining whether to:  Keep all… Read more »

How Vulnerable Are You to Cyberthreats?

Every company, regardless of size, industry, or location, needs a cybersecurity game plan. Whether you’re a mom and pop shop or a top shelf fortune 500 enterprise, your organization is vulnerable to the growing number of cyberthreats in the digital space. To combat current cyberthreats, inevitable cyberattacks, and potential data breaches, you MUST have a predefined, systemic approach. This approach should encompass… Read more »

The 6 Most Common Cyberthreats to Know

In a previous post, we discussed the prominent dangers lurking within the cyber arena. In case you missed it, here’s what you need to know:  WHAT: Data Breaches. TechTarget defines a data breach as “an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally… Read more »

The New Battlefield: Cyberwarfare

“We believe that data is the phenomenon of our time. It is the world’s new natural resource, it is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true—even inevitable—then cybercrime, by definition, is the greatest threat to every profession, every industry, every company in… Read more »

Cybersecurity Toolkit: Hashing 101

Implementing eSignatures is a true digital transformation for your company. While pen-and-paper may seem like the safer route, old-school signatures are actually easier to replicate and more difficult to verify than their electronic counterparts. eSignatures offer a fast, simple, and secure solution to guaranteeing your document gets signed when you want and by whom you… Read more »

The Cloud Isn’t for Everyone: A Case for On-Premise Electronic Signature

On premise

While the adoption of cloud usage continues to accelerate (greater than two out of three enterprises are incorporating the cloud today), a report issued by U.K.-based communications services provider BT Group indicates that IT decision makers’ confidence in the security of the cloud is at an all-time low. Moreover, a report issued by telecomm company… Read more »

Understanding NIST Standards When Dealing with Electronic Authentication

by Britni Zandbergen – IDology   The National Institute of Standards and Technology (NIST) is not only one of the nation’s oldest physical science laboratories, it is also a non-regulatory agency of the United States Department of Commerce. From nanotechnologies to the world’s largest and most complex creations, NIST conducts research in support of a… Read more »

How Legal Are Electronic Signatures?

Originally posted on Paperless Kitchen Blog 29 April 2013 Earlier in the month, we shared the findings of a survey conducted by Adobe that showed that paperless contracts continue to remain out of reach for most companies. One reason why many companies are wary of electronic contracts is because of signatures. Companies worry that if… Read more »