by Richard Barrus | May 21, 2019 | InfoSec Strategies
Reading Time: 3 minutes
May is “Privacy Month” on the Pivot Point Security blog, and we’re offering a multi-part post on the five indispensable success factors for law firms’ security/privacy initiatives. In Part 1, I introduced the 5 success factors and...
by Richard Barrus | Apr 23, 2019 | InfoSec Strategies
Reading Time: 3 minutes
What makes a password “strong”? And why is using only “strong” passwords so important? Both those questions can be answered in just two words: Password crackers. No, that’s not a crunchy snack—it’s a piece of garage-built,...
by Richard Barrus | Dec 4, 2018 | Disaster Recovery
Reading Time: 2 minutes
Recovery Time Objectives (RTOs) are the essential starting point for determining your disaster recovery strategy. Why? Because you need to know which functions are most critical and how long others can be deferred, so you can make...
by Richard Barrus | Nov 20, 2018 | InfoSec Strategies
Reading Time: 3 minutes
With the exponential growth of cloud computing, organizations of all sizes need to understand their risks around storing sensitive data in the cloud, as well as investigate and implement cloud security options. To support this...
by John Verry | Oct 2, 2018 | ISMS Consulting
Reading Time: 2 minutes
New data privacy regulations like GDPR and the California Consumer Protection Act of 2018 (CCPA) are forcing many organizations to factor privacy into their data security programs like never before. Do these new privacy mandates...