1-888-PIVOT-POINT | 1-888-748-6876
Select Page
GDPR & Privacy Shield - What They Mean for Your Business

Post Not Found

No Results Found

The blog post you’re trying to find has recently been removed as we work to clean up outdated information. We apologize for any inconvenience.

We invite you to read one of our recent posts or to explore one of our popular free resources below.

Free Resources:

ISO 27001 Roadmap ThumbnailISO 27001 is manageable and not out of reach for anyone!
It’s a process made up of things you already know – and things you may already be doing.

Download our ISO 27001 Roadmap now!

Mobile App Pen Testing ThumbnailApplications on Mobile Devices carry specific unique security concerns.
This whitepaper explores such vulnerabilities and explains in detail how to avoid them.

Download this Whitepaper Now!

ISO 22301 Roadmap ThumbnailBusiness Continuity Management ensures that your organizations critical business functions will continue to operate in spite of incident or disaster.

Download our ISO 22301 Implementation Roadmap now!

The ISO 22301 roadmap will help you understand what a Business Continuity Information Security Management System is and guide you, step by step, from preparation through certification.

Disaster Recovery Plan ThumbnailHow well do you know your disaster recovery plan?
Chances are, you won't know how effective your plan is until you test it.

Download our Operational Testing of your Business Continuity Plan Whitepaper now!

Phishing InfoGraphic ThumbnailDon't Get Hooked!

Phishing emails can appear in several different ways. Our 10 Tips for Detecting Phishing Emails infographic provides you with a cheatsheet of what to look for in unfamiliar emails. It's derived from our Cyber Security Awareness Education offering.

Download our Detecting Phishing Infographic now!

5 Bonus Benefits of a Network Vulnerability Assessment

Even if your company has a robust firewall, an intrusion detection system (IDS) and antivirus/anti-malware, hackers can still gain access to your systems and data by exploiting vulnerabilities in your networks. Finding those vulnerabilities before the attackers do...

File Inclusion Vulnerabilities and Defenses Against Them

File inclusion vulnerabilities, including Remote File Inclusion (RFI) and Local File Inclusion (LFI) are most commonly found in web applications running PHP scripts, but also frequently occur in JSP, ASP and other code. They allow an attacker to submit input to the...