The article published two weeks ago titled “Coronavirus (COVID-19) Guidance for Small and Large Businesses” listed the important points and resources the…
We noted in the last blog that organizations face new challenges and have to prepare for new risks. The sudden change in…
While preparing a risk-based audit plan, organizations include business continuity management as one of the important areas that serve not only as…
To accommodate remote work requirements organizations continued to make changes to technology infrastructure. For the information technology team, remote work is common…
To accommodate remote work requirements, organizations continue to make changes to technology infrastructure. For the information technology team, remote work is common…
Indeed Inc. has instructed all its employees – including more than 1,600 in Austin – to work from home. Indeed, said it…
The last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security which…
The news of cameras getting hijacked is not new and these examples exemplify the IoT security crisis. After reading through different publications…
According to the Opus and Ponemon 2018 report, 59 percent of companies said they have experienced a data breach caused by one…