Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news. Subscribe

I Do Not Think You Need What You Think You Need.
Mar 18, 2021 | Steven Anderson, Security Consultant

I Do Not Think You Need What You Think You Need.

It is a fairly common occurrence that organizations approach us unsure what type of security testing they need because a particular security framework, best practice, or compliance requirement states they need quarterly scanning or a penetration test. While these security frameworks serve an important purpose of ensuring a standard set of expectations and requirements for organizations, the language surrounding various technical controls or Security Testing Services can be confusing, generic, or all sound very similar to one another.

Read More
Wasted Security Resources Part II: Why Adding Microsoft’s Advanced Threat Protection Makes Sense for Most of Us
Mar 11, 2021 | Aaron Cable, True GSD Engineer

Wasted Security Resources Part II: Why Adding Microsoft’s Advanced Threat Protection Makes Sense for Most of Us

Many organizations that use Microsoft’s O365 platform for email and collaboration do not utilize the Advance Threat Protection (ATP) that is built-in. Yes, unless your company has purchased the 365 Business Premium or E5 and higher license, the ATP will need to be purchased as an add-on, and the reason many opt out of the ATP is due to the associated cost per user to enable this feature. However, in many cases, adding this to your licensing will save you from having to spend more money to lock down endpoints with other technologies, not to mention the time to vet, configure, integrate, and roll those technologies out.

Read More
Securing Your 2021 Remote Workforce with Microsoft Defender
Mar 04, 2021 | Tom Sherrill, IT Services, Guaranteed Networks

Securing Your 2021 Remote Workforce with Microsoft Defender

With the advent of the Covid-19 pandemic, Microsoft increased the push for its non-enterprise business Malware Security solution, marketing it as the product to protect assets as companies have their employees work from home.

Read More
2021 Cannabis Banking Legislation and What it Could Mean for PCI Compliance
Feb 25, 2021 | Vince Fusco, PCI Services Manager

2021 Cannabis Banking Legislation and What it Could Mean for PCI Compliance

Few industries have transformed as rapidly in recent years as cannabis. With major hits to the economy due to COVID-19, however, these moguls have had to reshape their strategies to compete with local dispensaries and smaller growers, many of whom appear to have had sticking power simply due to their lack of sophisticated investments. Those able to implement technology that not only sustains operations, but protects them from costly cyber-attacks, meets current and future regulatory requirements, and is flexible enough to adapt to evolving requirements are certain to have an edge.

Read More
Is my organization prepared for a ransomware attack?
Feb 18, 2021 | Kerry Steele, Senior Security Consultant

Is my organization prepared for a ransomware attack?

The reality is that preparing for ransomware attack continues to be a game of cat and mouse. As security technologies continue to advance with heuristics and machine learning capabilities to protect against and detect advanced attacks, our adversaries respond with capabilities to evade detection mechanisms. This can be discouraging to IT professionals anxious to get ahead of an attack and protect their systems, as well as their organizations, from risk.

Read More
Recap of the new Microsoft 365 Model – Where do I go from here?
Feb 12, 2021 | Ward Ruland – TrueGN Northeast Manager

Recap of the new Microsoft 365 Model – Where do I go from here?

We talk a lot at TRUE about leveraging the tools you already have at your fingertips to achieve security objectives, but if you return to your subscription to try to identify what you have versus what you may need, you may have found yourself confused trying to navigate all the new names and components. In fact, you may even have found yourself confused by a new title for the popular office suite.

Read More
Wasted Security Resources: You’re Not Getting the Most Out of Your IT Tools
Feb 04, 2021 | Corey Bolger, Security Consultant Risk Advisory Services

Wasted Security Resources: You’re Not Getting the Most Out of Your IT Tools

When an organization identifies a new technology threat, the first response is often to look for a piece of technology or a service that can mitigate or remove the threat. Frequently when working with clients, I have encountered situations where the client was looking to purchase a new tool to fulfill a specific need, but they already had a tool that could have solved the problem. The issue here is that many organizations only utilize a small subset of their IT tools and may not even realize the full or updated capabilities of what they already have.

Read More
HIPAA Trends & Predictions for 2021
Jan 28, 2021 | Tim Marley, Risk Advisory Services Director

HIPAA Trends & Predictions for 2021

Since passing in 2003, the OCR has issued total fines and penalties in excess of $129,000,000. The fact is, data breaches, hacks, ransomware, etc., are nothing new, but regulators are painfully aware that malicious actors are actively exploiting “windows of opportunity” due to COVID. Those who are succeeding in 2021 understand that their wins are directly tied to maintaining effective security and compliance programs this year. Before exploring those solutions, though, let’s dive deeper into the drivers behind this need.

Read More
5 Reasons to Continue Growing a Program in the Middle of a Pandemic
Jan 21, 2021 | Matt King, Security Analyst

5 Reasons to Continue Growing a Program in the Middle of a Pandemic

According to a survey by ISSA and ESG, cybersecurity professionals saw 63% increase in cyber-attacks related to the pandemic. With the current climate in mind, I’m going to give you 5 key reasons you should not only resist the temptation to put off your cybersecurity projects until after the pandemic levels out, but why you should prioritize growth in your program right now.

Read More
Identity is the New Perimeter: Passwordless Authentication Solutions
Jan 07, 2021 | Josh Spranger, Senior Network & Project Engineer

Identity is the New Perimeter: Passwordless Authentication Solutions

Security, as the saying goes, is not convenient. Security is meant to make it as hard as possible for the bad guys to gain access to things they shouldn’t. But as a result it makes end users life difficult, especially with the advent of multi factor methods of authentication. Sometimes, this can make your users frustrated with having to use several different forms of authentication or having to enter their passwords multiple times for each application.

Read More

Get Started with True Digital Security

Request a Consultation