Cybersecurity

Thinking Like an Attacker to Protect Privileged Access

“Privileged access can be exploited and used to gain access to sensitive data,” said Jermyn. “We’ve seen time and time again, attackers will get into the network. It’s not about keeping them out; it’s about limiting what they can do once they are in the network. How do we stop them from escalating privileges and… Read more »

Best Practices to Protect Your Vendors’ Sensitive Data from being Exposed on Desks, Printers and File Cabinets

It can be scary to think about open access to your vendors’ sensitive personal information. Get training, train your staff and even other internal employees that submit vendor documentation to you.