News & Information

News & Information
All Hands on Deck: Staff and Stakeholder Involvement in Incident Response Planning
Posted On Monday, July 31, 2017
Incident response plans focus on restoring damaged IT systems, but it's not just IT staff who are involved in responding to security incidents. Successfully containing, removing and recovering from an incident requires cooperation between business units, IT, legal counsel, human resources, public relations, and security and audit groups. Read on for our recommendations to achieve stakeholder and employee buy-in early on in the planning process.
ISO 27018 Certification for Cloud Service Providers
Posted On Wednesday, July 05, 2017
One of the newest members of the ISO 27000 family, ISO 27018 covers protection of personally identifiable information (PII) in public cloud environments. For cloud service providers looking to enhance security and win over customers, aligning with ISO 27018 may be worth the effort.
Shielding the Fortress: Physical Security for Data Centers
Posted On Wednesday, May 24, 2017
While a physical breach may not sound as threatening as ransomware or a denial of service attack, unauthorized intruders can wreak havoc on a data center, resulting in data losses, downtime and, potentially, a damaged reputation and diminished customer base. Read on for proven ways to protect your data center, systems and equipment.
Down but Not Out: Planning for Disaster
Posted On Wednesday, April 19, 2017
Come network outage or high water, your business operations shouldn't be down for long. Implementing a disaster recovery plan will ensure a smooth transition to a speedy recovery.
Innovation Through Partnership
Posted On Friday, April 14, 2017
At Securance, we know that the whole is greater and more powerful than the sum of its parts, and we enjoy helping clients like Franklin County, Ohio, achieve their goals. Read on to learn more about our work with the County.
Taking the Bait: Email Phishing in the Workplace
Posted On Friday, April 07, 2017
If you hear "phishing" and think about your bank accounts, you're not far off. But the risks to your business are just as great, if not greater. From credentials to trade secrets, to employee and customer information, the enterprise is a gold mine for hackers.
HIPAA Compliance Made Easy
Posted On Friday, April 07, 2017
Complying with HIPAA can seem like a Russian nesting doll of standards, requirements and testing protocols. In this article, we lay out the key steps to compliance with the Privacy, Security and Omnibus Rules.
3 Ways to Crack Down on Insider Threat
Posted On Monday, April 03, 2017
While organizations focus on the explosion of ransomware and hacker threats, insider attacks are quietly gaining ground. Here’s how to keep your IT infrastructure from crumbling from the inside.