Security Program Review
HALOCK’s Security Program Review is based on ISO 27001 and 27002. It provides a baseline of your current security posture. (more…)
Information Security Risk Assessment
A cyber security risk assessment goes beyond running a vulnerability scan and creating a prepackaged report. A risk assessment is a holistic examination of your security infrastructure, technology, people, and processes to develop a list of organizational risks based on potential business impacts. Whoa! Let’s examine that last sentence. (more…)
New Year’s Resolutions for 2012
It’s that time of year again! Yay! (more…)
Risk Assessments
We’re getting more and more demand for Cyber Security Risk Assessments these days. What are they and what’s involved? (more…)
The Weakest Link Part II
Continuing on with the employee security awareness thought: the weakest link – the WSJ article discusses other areas. (more…)
The Weakest Link in Cyber Security
Another great article by WSJ – this one on information security and employee cyber security awareness. Because hackers today are so advanced, applying all the security solutions at our disposal and shoring up the perimeter isn’t enough anymore. (more…)
Systems and Architecture Review
Systems and Architecture Review. So, you’re feeling pretty confident that you’ve got your environment locked down. Are you certain your infrastructure, servers, and devices deployed throughout your organization are protecting the confidentiality, integrity, and availability of your sensitive information assets? (more…)
Who is safeguarding your customers’ sensitive data?
Who is safeguarding your customers’ sensitive data? I’ve been reading with wonder, as I’m sure many of you have, about the seemingly endless parade of breaches for companies small & large. Increasingly, it isn’t the company reporting the breach that is the cause of the issue; rather it (more…)
Security Resolutions for the New Year
As we welcome in the New Year, it’s common for people to make a few New Year’s Resolutions. Let’s make a few New Year’s Information Security Resolutions! This year I challenge you to resolve to do the following: (more…)