Cyber Security News and Articles
The 10 Biggest Risks And Threats For Businesses In 2022
Risks and threats are precursors to corporate crisis situations. Some risks are universal, and pose a threat to every company, while other are relative and depend on the nature of an organization’s business or industry. No matter which risks or threats apply to a...
5 Common Computer Security Threats Businesses Are Facing in 2022
Do you want to keep your office secured and defended against a virus? What do you think are the main threats to an office’s computer security? Many of us don’t lock our offices at home at night, no matter how many notifications pop up. There are several threats to...
Everything and Anything You Need To Know About SOC 2
Protecting customers' data is a concern for all organizations regardless of the industry or size. Most organizations outsource key aspects of their business to third-party vendors such as Software-as-a-Service (SaaS) solutions or cloud hosting providers (i.e. Amazon...
What does the SOC2 Report cover?
Businesses often outsource services related to information technology and cloud services to the third-party for better operations. Although outsourcing may be a convenient option, yet it cannot possibly work smoothly without checks and due diligence. Entrusting your...
What to Know About Emerging SOC 2 Compliance Software: Part 1
The number of new software options that promise to streamline SOC 2 compliance has exploded in recent years – but are they really making compliance easier? There is no magic answer, but while SOC 2 compliance software can help you get a better understanding of...
Comparing SOC 2 Compliance Software Vendors
We compared 10 SOC 2 compliance software vendors to see who’s leading this quickly-growing market. Introduction Many of Fractional CISO’s clients have asked us which SOC 2 compliance software vendor they should select to help them run their SOC 2 program. This...
The Defense Department recently streamlined its Cybersecurity Maturity Model Certification program.
The Defense Department recently streamlined its Cybersecurity Maturity Model Certification program. As 2022 dawns, the Defense Department is hoping for a smoother path ahead for its process of ensuring that all defense industrial base contractors meet cybersecurity...
Strategic Direction for Cybersecurity Maturity Model Certification (CMMC) Program
Today, the Department of Defense announced the strategic direction of the Cybersecurity Maturity Model Certification (CMMC) program, marking the completion of an internal program assessment led by senior leaders across the Department. The enhanced “CMMC 2.0” program...
How to Avoid Smishing Attacks Targeting Subscription Service Users
If you’re anything like me, you used delivery more during the pandemic than before. Both getting food brought to my door and meal kit boxes mean people don’t have to mask up and go out to the grocery store. But threat actors know that, too. Recent scams take advantage...
A Third of Global Companies Have Experienced Ransomware Attack, Survey Finds
“Ransomware has become the enemy of the day.” Roughly a third of large international companies have faced a ransomware attack or other data break in the last 12 months, according to a new survey by the International Data Corporation, a market intelligence company....