March 18, 2020 - Remote work has become a necessity at many organizations. Follow these five steps to create a remote working environment that supports your organization while maintaining the security of your systems and data.
Author Archives for Allison Davis Ward
About Allison Davis Ward
Allison Davis Ward is a Partner at CapinTech. Throughout her time as an information systems auditor and senior manager, Allison has provided information security assessment and consulting services primarily for nonprofit organizations, financial institutions, and health facilities. In addition to these services, she has provided clients with consulting services in risk assessment and policy development engagements.
How far does your organization need to go when implementing application security? The first step is understanding common application security risks and the impact they can have.
What application security settings should your organization be using to protect against a cyber breach? Here are our recommendations and suggested next steps.
The U.S. National Security Agency (NSA) has uncovered a critical vulnerability that affects how Windows 10 trusts software and connects to remote computers. All Windows users should make the security update as soon as possible and turn on automatic updates.
As your organization uses more software and applications, you need an effective inventory system to manage and secure what you’re using. These three steps will help you get started.
IT asset management can seem like a mountainous task, but strategic planning will make the task manageable and save you headaches and sleepless nights. These steps will help you get started.
Remote desktop protocol (RDP) is often used for working remotely and providing IT support. But while RDP provides convenience and efficiency, it also has many security implications. Take these steps to help secure it.
Don’t overlook physical security in conjunction with your organization’s cybersecurity controls. The most robust cybersecurity measures are useless if a criminal can walk into your office and steal the hardware housing your data.
Better management and security controls for mobile devices should be part of the cybersecurity strategy at every organization. Consider these five steps to reduce your organization's cyber risk.
Many churches provide Wi-Fi for the convenience of employees and guests. However, this complimentary benefit can come with a heavy price if security is taken for granted. Take these steps to help protect your church.