Support: (615) 499-7801

Category Archives: IT Compliance

A spiral-bound book on a table titled “Business Continuity Plan” with charts and clips scattered on the table.

Future-Proof Your Business with Continuity Planning

Creating a business continuity plan (BCP) on your own can be daunting. You may feel overwhelmed wondering what critical business functions to include in your plan, what risks to create contingencies for, and how to even start your business continuity planning. But whether it’s a regulatory requirement, a new contract, or concern about business sustainability, … Continue reading "Future-Proof Your Business with Continuity Planning"
Read More
A person in a black jacket and hood with the words “ethical hacking” printed over the image.

What Is Penetration Testing & Why Should You Care?

Does your CEO have administrative access to the entire network? Do your employees wear their ID badges when they leave for lunch? Is anyone with a maintenance badge given free-range to your facility? If you answered yes to any of these questions, your business has a serious vulnerability risk that must be corrected. Otherwise, you … Continue reading "What Is Penetration Testing & Why Should You Care?"
Read More

Phishing attacks remain a cybersecurity problem, experts say

Have you recently received a communication that initially scared you? Perhaps a notice that your credit card had unauthorized transactions, your bank account needed attention, or your favorite shopping site needed to verify some information to complete your latest purchase, which you knew was an important but last-minute gift? And this notice asked you to … Continue reading "Phishing attacks remain a cybersecurity problem, experts say"
Read More

Social Media – A Cybercriminal Resource

Do you know someone who spends a lot of time on Social Media? Someone who’s posting nearly daily about their activities? Even if you avoid Facebook, Instagram, Pinterest, TikTok, and other Social Media outlets, your friend could still be putting you at risk. During Cybersecurity Month – and all year – the U.S. Cybersecurity and … Continue reading "Social Media – A Cybercriminal Resource"
Read More

ImageQuest’s Shutt speaks about Vendor Management at NGage

Director of Information Security Services Sammi Jo Shutt served as a panelist on Vendor Management Tuesday at the  NGage annual conference in Newport Beach, Calif. Sammi Jo joined two others on the topic of best practices for vendor relationships. The session focused on making the Vendor Management process more than due diligence. It also covered … Continue reading "ImageQuest’s Shutt speaks about Vendor Management at NGage"
Read More