File Backup

When considering security, most of the attention is placed on the confidentially of sensitive information.  Controls are put in place to ensure that the appropriate individuals have the right access to information. Security, however, address three areas protecting the sensitive information: Confidentiality Integrity Availability The availability of information is as Read more…

Recent Ransomware Attacks

The news has been dominated recently by reports of ransomware attacks.  Specifically, we’ve heard about the attacks in the gas pipeline and meat processing industries.  Though the news media is treating this as if it were a breaking event, the reality is that these types of attacks have been threatening Read more…

Responding to Information Security Questionnaires

Responding to Information Security Questionnaires Companies are placing an increased amount of attention on their information security exposure in the supply chain. While establishing a relationship and doing business with you, your customers have a vested interest in understanding the risk of exposing their protected information to additional downstream parties. Read more…

Disclosure of Information Enforcement

Disclosure of Information Enforcement Information Security focuses on the controls necessary to limit access to sensitive information and reduce fault tolerance with the objective of preventing associated incidents and breaches.  However, at the same time we are working to reduce exposure, it is of vital importance to have this information Read more…