Secure Perspectives

Continuous Monitoring in the Cloud

The Health IT community has embraced an accelerated progression to cloud-based services and capabilities. With this progression comes a necessary question: ”What do we do next” when addressing critical cyber activities like Continuous Monitoring (CM) and persistent Risk Management (RM) “as a Service”?

Read More »

Securing Internet-Connected Devices in Healthcare

82% of healthcare providers that have implemented Internet-of-Things (IoT) devices have experienced a cyberattack on at least one of those devices over the course of the past 12 months.
The biggest threat from these IoT cyberattacks is the theft of patient data.

Read More »

Securing Devices in the Age of Telework

If 2020 has been anything, it has been a stress-test on the ability of organizations to adapt to rapid and disruptive change. Some organizations are waiting to a return to normal, while others have accepted the present state as the new normal. Regardless of which outcome you are experiencing, one thing is almost certain certain; the dynamic of teleworking has changed.

Read More »

What CMMC Level Will Your Company Need to Meet?

As you begin to do your research on reaching CMMC guidelines, one of the first questions you’re likely trying to answer is what level your company needs to meet. It’s one of the first questions asked, and rightfully so; once you know what CMMC level you need to meet to reach compliance, all you have to do is begin implementing the controls and guidelines to reach compliance.

Read More »

We’re Hiring

Join the fastest-growing team in cyber