Security in a Cloud Computing Environment
June 29, 2020 6:01 pm Leave your thoughtsJune 29, 2020 - If your organization uses a cloud computing environment, it’s important to understand the inherent security risks and take steps to reduce them.
Allison Davis Ward is a Partner at CapinTech. Throughout her time as an information systems auditor and senior manager, Allison has provided information security assessment and consulting services primarily for nonprofit organizations, financial institutions, and health facilities. In addition to these services, she has provided clients with consulting services in risk assessment and policy development engagements.
June 29, 2020 - If your organization uses a cloud computing environment, it’s important to understand the inherent security risks and take steps to reduce them.
April 28, 2020 - Zoom has become a very popular videoconferencing solution, but many security concerns have started to surface. Here's what your organization should know if you use Zoom or are considering it.
March 18, 2020 - Remote work has become a necessity at many organizations. Follow these five steps to create a remote working environment that supports your organization while maintaining the security of your systems and data.
How far does your organization need to go when implementing application security? The first step is understanding common application security risks and the impact they can have.
What application security settings should your organization be using to protect against a cyber breach? Here are our recommendations and suggested next steps.
The U.S. National Security Agency (NSA) has uncovered a critical vulnerability that affects how Windows 10 trusts software and connects to remote computers. All Windows users should make the security update as soon as possible and turn on automatic updates.
As your organization uses more software and applications, you need an effective inventory system to manage and secure what you’re using. These three steps will help you get started.
IT asset management can seem like a mountainous task, but strategic planning will make the task manageable and save you headaches and sleepless nights. These steps will help you get started.
Remote desktop protocol (RDP) is often used for working remotely and providing IT support. But while RDP provides convenience and efficiency, it also has many security implications. Take these steps to help secure it.
Don’t overlook physical security in conjunction with your organization’s cybersecurity controls. The most robust cybersecurity measures are useless if a criminal can walk into your office and steal the hardware housing your data.