<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

How serious is an incident? The Comprehensive Guide to Incident Response

What defines a cyber “incident”, and if it happens to your business, how serious is it? These are two prominent questions among businesses of all sizes and industries. These questions, however, are especially vital to answer for small businesses who often lack the staffing, technology, and resources to understand and implement adequate cybersecurity.

Posted on March 03, 2020

Complying with the SHIELD Act: Cybersecurity Requirements for Businesses

New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.

 

Posted on January 30, 2020

Cyber Defense Roster: Your key players in the fight against cyberattacks

Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.

Posted on November 12, 2019

The Rubber Ducky: Cyber meets physical with this small hacking tool

Your adversary may not always be on the other side of a screen.

Posted on November 11, 2019

Four Tips For Creating a Strong Security Culture

Brazen cyber attacks by organized crime rings and political groups against high-profile retail giants, powerful government agencies, and energy facilities make news. But you may be surprised to know that one of the biggest risks to the cybersecurity of most businesses isn’t the deliberate, malicious acts of outsiders, but rather the benign, every-day behaviors of employees.

Posted on August 17, 2016

Drinking from the SANS Fire Hose: The Finest Cybersecurity Instruction

The SANS Institute is a cooperative research and education organization that reaches more than 165,000 security professionals around the world. Their programs undergo constant scrutiny and revision to ensure that the content is both on point and represents the state of the information security landscape as it stands today. 

Posted on April 28, 2016

TOP ARTICLES:

QUESTIONS?