Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news. Subscribe

Microsoft Announces New Subscription Pricing for M365
Nov 22, 2021 | Tim Meuter, IT Director

Microsoft Announces New Subscription Pricing for M365

Microsoft announced they will be increasing the pricing of the subscription for many of the Online Subscriptions. According to Jared Spataro, Corporate Vice President for Microsoft 365, this is the first time Microsoft has increased its prices since 2011.

Read More
Water Sector: Tackling IT-Security Fundamentals with Strategic Partnerships
Nov 18, 2021 | Michael Oglesby, Executive Vice President of Services and Innovation

Water Sector: Tackling IT-Security Fundamentals with Strategic Partnerships

Water and Wastewater Facilities are facing a crucial time in their journey to modernization, as Digital Transformation is bringing about a shift in risk. For those of us who specialize in cybersecurity and critical infrastructure, it was no surprise that cybersecurity recently moved up from number 16 to number 12 in top risks facing the water sector (American Water Works Association). As industry modernization projects like smart water systems and advanced data analytics are rolled out, we can only expect this trend to rise, with cybersecurity’s taking centerstage as the number one concern. Cybersecurity is a growing concern not just within the water sector, but across all industries.

Read More
Azure Information Protection
Nov 11, 2021 | Jim Ellington, IT Engineer

Azure Information Protection

Due to the increased mobility of workers and staff working remotely, more businesses are relying on cloud services to ensure their workforce can access the files needed to do their job in a timely manner. With this increased availability, however, comes increased risk. Azure Information Protection – also known as AIP – provides a way to label and protect files and emails no matter where they are stored, change access rights after a document has left the security of your network, and see who has been accessing your confidential files.

Read More
Cybersecurity Trends in Energy Part II: Why Are Oil & Gas Professionals So Upset Over New Guidelines?
Nov 04, 2021 | Jerald Dawkins, PhD, TRUE Co-founder

Cybersecurity Trends in Energy Part II: Why Are Oil & Gas Professionals So Upset Over New Guidelines?

In our last installment, we explored the escalation of threats to U.S. water facilities. Follow our whole Energy series for insights into trends across infrastructure, cyber threats, and regulations as electric, oil & gas, and water facilities are developing a very familiar pattern. CISOs carry the burden of needing to protect their organizations’ integrity and business continuity, but often with less budget than they need. So, you would think that after TSA announced a second set of escalated cybersecurity requirements for key pipelines and liquified natural gas (LNG) companies, CISOs would welcome this. Why is it causing so many waves?

Read More
Policy Development
Oct 28, 2021 | Randy Griffith, Senior Security Consultant

Policy Development

Policy? We ain’t got no policy? We don’t need no policy! I don’t have to show you any stinking policy! This play on a quote from the 1948 film The Treasure of the Sierra Madre perfectly captures how many organizations approach policy development, but they might change their minds if they understood how vital policy is to their organization. Simply defined, a policy is just a guideline that governs actions and processes within your organization. All policies should be aligned with your organization’s requirements and business goals, and they should be written down to help guide decisions or achieve an intended outcome. For example, your board may not want people who have been convicted of fraud or embezzlement working in the finance department, with access to corporate bank accounts and the ability to transfer money.

Read More
As Energy Sector Modernizes, Water Facilities Mitigate New Risk
Oct 21, 2021 | Michael Oglesby, Executive Vice President of Services and Innovation

As Energy Sector Modernizes, Water Facilities Mitigate New Risk

On February 5, 2021, an unknown cyber attacker hacked into a water treatment facility in Florida, prompting alarm among energy providers who use Industrial Control Systems (ICS). This facility, much like many other water facilities across the country, had embraced modern digital technologies, connecting more and more industrial control systems   (ICS) and internet of industrial things (IIoT) to corporate and remote networks. The goal of connecting systems is to support better efficiencies and modernize aging computing infrastructures.

Read More
6 Reasons Why Microsoft 365 Backup is Critical
Oct 14, 2021 | David Beiser, IT Engineer

6 Reasons Why Microsoft 365 Backup is Critical

Six critical reasons to protect your Microsoft 365 data with timely backups and TRUE digital support.

Read More
Rush to the Cloud is Driving Growth, and New Trends in Cybersecurity
Oct 07, 2021 | Heath Gieson, ‪VP Operations

Rush to the Cloud is Driving Growth, and New Trends in Cybersecurity

With so many companies having sped up their digital transformation processes, there’s no reason not to just lean into them full-tilt, and CFOs are at the front of this race. It would appear that to support growth through creative business models that are built to survive a pandemic (or whatever else comes our way), CFOs are continuing to increase investments into digital transformation initiatives that create new revenue streams.

Read More
How Much Damage Can be Done While You’re Still Investigating Alerts?
Sep 29, 2021

How Much Damage Can be Done While You’re Still Investigating Alerts?

Most organizations, especially in the tech and midmarket spaces, receive spending approval to buy security tools, but minimal budget for additional people to manage them. This is like rush hour at the grocery store with only 1 lane open. There are only so many transactions that can be processed that way. Ideally, some of those transactions could be automated, and for those that can’t, every aisle should be open. It’s the same for your security teams and alerts. No alert, or “transaction”, can be overlooked, but when your people get overwhelmed, some of them are bound to slip through, allowing attackers to fly under the radar. I want to examine an attack from both sides– the attacker, and the responder.

Read More
TRUE Ranks 90 in the World for 2021 Cybersecurity Award
Sep 23, 2021

TRUE Ranks 90 in the World for 2021 Cybersecurity Award

We are proud to announce that True Digital Security has climbed in global rankings from 100th to 90th in MSSP Alert’s annual analysis. With more nominations than ever before, this year's applicants spanned 26 countries and were ranked by 3 key criteria: size of in-house cyber-expert teams, quality of cybersecurity offerings, and overall annual program revenue, profitability, and growth. While TRUE is pleased to have risen in such an elite list, we are most thankful for what that growth means to our clients.

Read More

Get Started with True Digital Security

Request a Consultation