Solutions: Assessments & Reviews

Michelle Drolet

Approximately 1 in 3 SMBs were hit by a cyberattack last year—some costing upward of $7 million. The need to prioritize cybersecurity has never been greater. Let’s explore nine cybersecurity elements that organizations must prioritize for 2025. 1. Put Someone In Charge Just like you have an expert in charge of looking after your company’s finances, it’s

Janelle Drolet

If you’re in charge of payment card data at your company, you’ve probably come across the term PCI DSS. No, it’s not some secret code; it stands for Payment Card Industry Data Security Standard. Basically, it’s a set of rules designed to keep your customers’ card info safe from cyber crooks. Here to tackle today’s

Michelle Drolet

Just in time for the 2024 U.S. elections, cyberattacks and malicious activities are ramping up. For numerous reasons, elections are the perfect time for opportunistic cybercriminals to target businesses: • High visibility: Elections provide an ideal platform for nation-states and hacktivists looking for ways to undermine democracies, destabilize elections, damage reputations and steal campaign data. Since elections

Michelle Drolet

About 63% of organizations worldwide have partially or fully implemented a zero-trust strategy. For those who don’t know what zero trust means, it’s basically a security model that enforces strict verification for every user and device that is trying to access applications or other company assets. So why is zero trust suddenly so popular? There are several

Michelle Drolet

The Federal Trade Commission’s Standards For Safeguarding Customer Information Rule (aka The “FTC Safeguards Rule”) is a regulation requiring entities to develop, implement and maintain a comprehensive information security program consisting of appropriate administrative, technical and physical safeguards to keep nonpublic personal/customer information secure. Although this regulation came into effect in 2003, it was updated

Michelle Drolet

Every 39 seconds some company is being hit by a cyberattack. Security incidents are a constant threat, an inevitability rather than a possibility. An incident response plan can help organizations as they grapple with the aftermath of a cyberattack, revealing a clear path through chaos, offering a step-by-step plan of action to contain and mitigate threats. However,

Michelle Drolet

Critical infrastructure and public sector organizations such as governments and municipalities, manufacturing units, communication networks, transportation services, and power and water treatment plants have been battling a growing wave of breaches and cyberattacks. Three main reasons exist why critical infrastructure is being targeted: • Opportunity for real-world disruption. Attacks on railways, ports or air control systems can create shortages

Michelle Drolet

Religious organizations, Houses of Worship (HoWs) and missionaries (schools, hospitals, non-profits) often carry a false notion that they are at least risk of cyber-attacks (compared to ordinary businesses), because they are not involved in buying and selling of commercial goods and services. Contrary to this popular belief, cybercriminals have been regularly targeting churches, catholic organizations, and even the Vatican.

Michelle Drolet

Religious organizations, Houses of Worship (HoWs) and missionaries (schools, hospitals, non-profits) often carry a false notion that they are at least risk of cyber-attacks (compared to ordinary businesses), because they are not involved in buying and selling of commercial goods and services. Contrary to this popular belief, cybercriminals have been regularly targeting churches, catholic organizations, and even the Vatican.

Michelle Drolet

In an era where data breaches and cyber threats loom, the security of patient information in plastic surgery practices (PSPs) is more critical than ever. Envision a scenario where, in a mere moment, the confidential data of your patients is at risk, posing a serious threat to the trust they place in your practice and