Default configurations of technologies may be convenient and user-friendly, but they are rarely optimal when it comes to security. That is where these system hardening tips come in.

(more…)

An IT risk assessment finds security risks, threats, and vulnerabilities affecting technologies, IT processes, and compliance status. Identifying risks, and how to mitigate them, supports longstanding sustainability, resiliency, and agility within the IT environment.

(more…)

On December 13, 2020, Cybersecurity & Infrastructure Security Agency (CISA) issued its fifth ever Emergency Directive. The agency instructed all national networks to disconnect products from SolarWinds’ Orion. 

(more…)

Bot attacks, which use automated web requests— essentially, Internet robots— to disrupt websites, applications, APIs, and end users, sound like the subject of a dystopian horror film. Unfortunately, they’re real, and increasingly persistent. Here’s what you can do stop them.
(more…)

2021 was a year of change for IT and cybersecurity leaders.  IT leaders should review last year’s successes and failures, and adjust their strategies to keep pace with risks and trends in 2022. Here are the top 3 takeaways from 2021.

(more…)

Wearables that track health information aren’t necessarily protected by HIPAA standards. Is wearing a smart watch worth the security risk?

(more…)

Securance’s founder and president, Paul Ashe, sat down with tED Magazine to discuss the importance of data privacy— and common mistakes organizations make when developing data privacy policies.

(more…)