Digital Spring Cleaning – 10 Ways to Protect Your Identity

We asked our IT experts to help answer 10 questions posed by the National Cyber Security Alliance, suggesting ways that both organizations and individuals can participate in a “digital spring cleaning.” Although these questions are focused around the spring season,...
Why a Third-Party Cyber Risk Management Program is Essential

Why a Third-Party Cyber Risk Management Program is Essential

The cyber threat landscape is changing and expanding with the cost benefits of outsourcing. As a result, attack surfaces frequently extend beyond the purview of the enterprise; third-party provider operating risks may be misunderstood or unacknowledged. In order to...
18 Reasons to Care More About Data Privacy in 2018

18 Reasons to Care More About Data Privacy in 2018

Yesterday was Data Privacy Day, and as a Data Privacy Champion, we advocate for committing resources towards protecting the information that is a valuable asset to your business. We believe that traditional technical controls are only one part of security, and that’s...
3 Cybersecurity Gifts You Should Give Yourself

3 Cybersecurity Gifts You Should Give Yourself

It’s the gifting season and on the business front, there’s no better gift to give yourself and your company than improved cyber maturity to meet 2018’s cyber-related security challenges. We asked some Secure Halo experts for their ideas on ways to bestow enhanced...
Critical Infrastructure – Securely Integrate New Technology

Critical Infrastructure – Securely Integrate New Technology

The nation’s critical infrastructure – the power grid, communication channels, financial systems, etc. – that we rely on, increasingly requires cybersecurity expertise and management in today’s connected world. From protecting the intellectual property that drives our...
How to Manage Third-Party Cyber Risk

How to Manage Third-Party Cyber Risk

When establishing defensive measures to secure their enterprise, many organizations often overlook a key element – those outside of their network, but who are still connected to their digital ecosystem. In other words, any vendor, supplier, partner, or third party who...