Blog2018-03-15T13:00:03+00:00

IoT Evolution, Revolution or Confusion?

The IoT (Internet of Things) evolution is occurring in business and personal lives, the revolution is amazing as it transforms the way we think and act, and the confusion around how to secure IoT [...]

Is Identity the New Perimeter in Security?

I’ve recently heard the phrase, “identity is the new perimeter” as it relates to information security. That said, I’ve also heard the same about endpoints, artificial intelligence, email, you name it. If I didn’t [...]

Saving Money AND Maturing Security? Tell Me How!

When it comes to mitigating risk in your organization, cyber security is one of the most important issues. Most of us have sat through painful sales pitches, where things are said like "100% secure." [...]

Managed Security Services – The Reality……

We all know the security industry is exploding with new products and services that are being marketed as “the only way to secure your environment.” Similarly, we are seeing all sorts of providers that [...]

[InfoGraphic] Presenting to the Board

Many struggle when presenting privacy and security topics to the Board. Use this InfoGraphic to understand the top three things NOT to do. Download InfoGraphic

STOP the Madness…..

FocusPoint is introducing a new program called STOP – Security Technology Optimization Program. This offering will focus on helping companies get the most out of their security technology investments, without adding more tools to [...]

Hey before you leave. Subscribe to The Cyber Chronicle – Most popular news each week on cyber security.

Opt out at anytime.   No SPAM just great weekly content.

Click here to receive information about our free cyber security assessment.