Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

Subscribe
2021 Cannabis Banking Legislation and What it Could Mean for PCI Compliance
Feb 25, 2021 | Vince Fusco, PCI Services Manager

2021 Cannabis Banking Legislation and What it Could Mean for PCI Compliance

Few industries have transformed as rapidly in recent years as cannabis. With major hits to the economy due to COVID-19, however, these moguls have had to reshape their strategies to compete with local dispensaries and smaller growers, many of whom appear to have had sticking power simply due to their lack of sophisticated investments. Those able to implement technology that not only sustains operations, but protects them from costly cyber-attacks, meets current and future regulatory requirements, and is flexible enough to adapt to evolving requirements are certain to have an edge.

Read More
Is my organization prepared for a ransomware attack?
Feb 18, 2021 | Kerry Steele, Senior Security Consultant

Is my organization prepared for a ransomware attack?

The reality is that preparing for ransomware attack continues to be a game of cat and mouse. As security technologies continue to advance with heuristics and machine learning capabilities to protect against and detect advanced attacks, our adversaries respond with capabilities to evade detection mechanisms. This can be discouraging to IT professionals anxious to get ahead of an attack and protect their systems, as well as their organizations, from risk.

Read More
Recap of the new Microsoft 365 Model – Where do I go from here?
Feb 12, 2021 | Ward Ruland – TrueGN Northeast Manager

Recap of the new Microsoft 365 Model – Where do I go from here?

We talk a lot at TRUE about leveraging the tools you already have at your fingertips to achieve security objectives, but if you return to your subscription to try to identify what you have versus what you may need, you may have found yourself confused trying to navigate all the new names and components. In fact, you may even have found yourself confused by a new title for the popular office suite.

Read More
Wasted Security Resources: You’re Not Getting the Most Out of Your IT Tools
Feb 04, 2021 | Corey Bolger, Security Consultant Risk Advisory Services

Wasted Security Resources: You’re Not Getting the Most Out of Your IT Tools

When an organization identifies a new technology threat, the first response is often to look for a piece of technology or a service that can mitigate or remove the threat. Frequently when working with clients, I have encountered situations where the client was looking to purchase a new tool to fulfill a specific need, but they already had a tool that could have solved the problem. The issue here is that many organizations only utilize a small subset of their IT tools and may not even realize the full or updated capabilities of what they already have.

Read More
HIPAA Trends & Predictions for 2021
Jan 28, 2021 | Tim Marley, Risk Advisory Services Director

HIPAA Trends & Predictions for 2021

Since passing in 2003, the OCR has issued total fines and penalties in excess of $129,000,000. The fact is, data breaches, hacks, ransomware, etc., are nothing new, but regulators are painfully aware that malicious actors are actively exploiting “windows of opportunity” due to COVID. Those who are succeeding in 2021 understand that their wins are directly tied to maintaining effective security and compliance programs this year. Before exploring those solutions, though, let’s dive deeper into the drivers behind this need.

Read More
5 Reasons to Continue Growing a Program in the Middle of a Pandemic
Jan 21, 2021 | Matt King, Security Analyst

5 Reasons to Continue Growing a Program in the Middle of a Pandemic

According to a survey by ISSA and ESG, cybersecurity professionals saw 63% increase in cyber-attacks related to the pandemic. With the current climate in mind, I’m going to give you 5 key reasons you should not only resist the temptation to put off your cybersecurity projects until after the pandemic levels out, but why you should prioritize growth in your program right now.

Read More
Identity is the New Perimeter: Passwordless Authentication Solutions
Jan 07, 2021 | Josh Spranger, Senior Network & Project Engineer

Identity is the New Perimeter: Passwordless Authentication Solutions

Security, as the saying goes, is not convenient. Security is meant to make it as hard as possible for the bad guys to gain access to things they shouldn’t. But as a result it makes end users life difficult, especially with the advent of multi factor methods of authentication. Sometimes, this can make your users frustrated with having to use several different forms of authentication or having to enter their passwords multiple times for each application.

Read More
What Are Purple Team Exercises and Who Needs Them?
Dec 17, 2020 | Michael Oglesby, Vice President of Security Services Operations

What Are Purple Team Exercises and Who Needs Them?

Terminology and acronyms in cyber security can get confusing. Try to distinguish between Blue Team, Red Team, Black Box, White Box – and now Purple Team exercises, it can be hard to know if you are dealing with terminology or marketing buzz words unless you are a security testing insider. Are we talking about offense or defense? Internal or external? Penetration testing or a vulnerability assessment? One-time or ongoing? We can explore a number of these topics going forward, but I am going to specifically focus on Purple Team exercises in this blog, laying out key definitions, the purpose behind this style of exercise, key stakeholders you will want to involve, and what outcomes you should expect.

Read More
Why “Security First Approach to IT Services is the ONLY Approach”
Dec 10, 2020 | Anna Krupka, Technology and Security Advisor

Why “Security First Approach to IT Services is the ONLY Approach”

During my time at TRUE I have seen some major pitfalls from companies that failed to see the importance of having a “Security First” approach to their IT. So I’m here to explain why you – YES, YOU – should take the “Security First” approach to heart.

Read More
Move the Needle with Your Vulnerability Management Program
Dec 03, 2020 | Kayna Kelley, Security Sales Executive Coordinator

Move the Needle with Your Vulnerability Management Program

TRUE has been providing managed vulnerability scanning services for clients for years, scanning external and internal network environments for the latest exploits, supplying reports, and remaining just a phone call away for remediation guidance, report interpretation, and discussing what keeps our clients up at night. Scanning continues, but organizations don’t always move the needle and are often no more secure as a result.

Read More

Get Started with True Digital Security

Request a Consultation