Posted On Monday, August 06, 2018
It's no secret that we're facing a cyber security staff and skills shortage. By 2019, between one and two million cyber security positions will be unfilled. Given the dynamic — and virulent — nature of the cyber threats that plague businesses today, that's alarming. Here's what enterprises and educational institutions can do to close the gap.
Posted On Friday, July 20, 2018
At Securance, we spend a lot of time thinking, talking and advising clients about network and system security — but we also realize that "security" carries other meanings, and a greater purpose, outside of our office. This year, we're supporting Feeding Tampa Bay, a local food relief organization dedicated to helping "food insecure" children and adults throughout Tampa and the surrounding areas.
Posted On Monday, July 16, 2018
Industrial control systems (ICS) automate and manage processes, such as the delivery of water and electricity, that are critical to modern life. As ICS adopt IT solutions and become less isolated from business networks, the attack surface — and the potential for disaster — increases. The NIST Cybersecurity Framework (CSF) can aid ICS operators in establishing effective controls to improve cyber defenses and combat threats.
Posted On Friday, June 29, 2018
Whatever industry you're in, cyber risk is inherent in your day-to-day business transactions. Protect yourself by covering your liability for losses in the aftermath data breaches, employee errors, and cyber extortion.
Posted On Monday, April 30, 2018
What is a virtual CISO and how do "vCISO" packages benefit small and medium-sized businesses? Determine whether a vICSO is right for you.
Posted On Friday, March 30, 2018
Is hiring a CISO really necessary? Understand the benefits of executive oversight over information security.
Posted On Wednesday, February 28, 2018
Take an active approach to IT security by continuously improving the maturity of your security program.
Posted On Wednesday, January 31, 2018
The best defense is a good offense. Take an active approach to information security by assessing security program maturity.