Webinar: Working with the Board – Setting Expectations

Whether you have worked with the Board previously or you are just now establishing a regular cadence, you want to ensure realistic expectations are set. Watch this webinar to see how other companies do this successfully!

By |2018-08-05T01:03:46+00:00November 8, 2018|Comments Off on Webinar: Working with the Board – Setting Expectations

Webinar: Working with the Board – Showing Progress

Whether you have worked with the Board previously or you are just now establishing a regular cadence, the key is to show progress against your privacy/security program. Watch this webinar to see how other companies do this successfully!

By |2018-08-05T00:51:21+00:00October 11, 2018|Comments Off on Webinar: Working with the Board – Showing Progress

SMB Cybersecurity Act – Hopefully Optimistic

It has taken a while, but the President did sign the Small Business Cybersecurity Act into law on August 18, 2018. This Act “requires the Commerce Department’s National Institute of Standards and Technology to develop and disseminate resources for small businesses to help reduce their cybersecurity risks.” Small businesses often have smaller budgets and [...]

FocusPoint Proprietary Vetting Process

There are thousands of products in the industry today all vying for your attention. FocusPoint's proprietary vetting process helps companies find the best fit solution for their complex environment!

By |2018-08-08T20:55:58+00:00August 6, 2018|Comments Off on FocusPoint Proprietary Vetting Process

[Infographic] 5 Ways to Fund Your Privacy/Security Program

One area security leaders struggle with on a regular basis is how to fund the much-needed security initiatives within the organization. Here are five different ways to work with the business and IT to accomplish both the funding as well as showing progress on your maturity roadmap. How many times have you had to [...]

[Infographic] 3 Ways to Accelerate Your Security Program

Whether you are looking to jump start a privacy/security initiative or accelerate the maturity and success of an existing program, these steps are foundational.  Here are three areas to FOCUS on specific POINTS when you are unsure of where to start. For additional information on how to do this, watch the webinar series related [...]

Webinar: Jump Start Your Privacy/Security Program

The first in our "Security Maturity" webinar series designed to provide practical ways to improve your information security program. This webinar will focus on proven methods to "jump start" your program.

By |2018-08-08T20:48:01+00:00June 13, 2018|Comments Off on Webinar: Jump Start Your Privacy/Security Program

“Alexa . . . how do I secure the Internet of Things (IoT)?”

Imagine, a device in your home, with access to multiple parts of your home (TV, lights, thermostat, door locks). The device is always listening for your command, which means it’s also always listening to your conversations. The device is certainly connected to a network, which probably isn’t set to be very secure by nature. [...]

Hey before you leave.   Subscribe to the latest in cyber security news – The Cyber Chronicle. It’s the fastest growing channel on security on youtube.

Subscribe to our newsletter and receive the latest news on cyber security.