1-888-PIVOT-POINT | 1-888-748-6876 info@pivotpointsecurity.com
Talk with an Expert »
Select Page
GDPR & Privacy Shield - What They Mean for Your Business

Sitemap

CREST vs. SANS

We recently had a client ask us about how CREST and SANS compare. This post strives to answer that question in a “quick but thorough” manner. CREST and SANS are both prominent official bodies serving the information security industry worldwide, and both offer...

“Where to Start” for Security and Privacy Initiatives in the Legal Vertical

May is “Privacy Month” on the Pivot Point Security blog, and we’ve already posted a multi-part article on 5 Indispensable Success Factors for law firms’ security and privacy initiatives. In this post, I’ll move the discussion to the next level, to answer the question...

Why ISO 27001 is like Managing an NFL Team

I’m a football geek. This means two things: A significant portion of my Sundays throughout the year are completely booked; and Relating concepts to football is a sure-fire way to help me understand just about anything. I recently jumped on a call with a potential...

How Being in Information Security Has Changed My Annual OBGYN Visit

Disclaimer: We are a transparent organization, and this is going to be very (very) transparent. All day, every day I speak to CIOs, CTOs, CISOs, IT Directors, Risk Management Professionals, etc. in charge of managing information related risk within their...

5 Success Factors: Law Firm Data Security & Privacy Initiatives (Part 3)

May is “Privacy Month” on the Pivot Point Security blog, and we’re offering a multi-part post on the five indispensable success factors for law firms’ security/privacy initiatives. In Part 1, I introduced the 5 success factors and explained why they’re so critical....

5 Success Factors: Information Security for Law Firms (Part 2)

May is “Privacy Month” on the Pivot Point Security blog, and we’re offering a multi-part post on the five indispensable success factors for law firms’ information security and data privacy initiatives. In Part 1, I introduced all 5 success factors and explained why...

5 Success Factors: Cyber Security for Law Firms (Part 1)

Many law firms are already moving towards stronger information security and privacy postures. They’re doing things like aligning with the ISO 27001 or NIST security frameworks, conducting vulnerability assessments or penetration tests on their networks, looking at...

Don’t Pay the Price for an Unsecured Managed Services Vendor

Managed service providers (MSPs) are popular with SMBs/SMEs for good reason.  They can often maintain an organization’s network, applications and/or security posture better than many in-house IT departments can, and at a lower cost. They benefit from economies of...

You Can’t Afford to Ignore CCPA Like You Ignored GDPR

If your company is like many of our SMB/SME clients, GDPR was a short-lived event. You heard about the regulation, kicked-off a GDPR project, realized how significant the work effort was and how limited the likelihood of an action against your organization was, and...

Discover the 4 Steps to Building an Information Security Plan

Even though having an information security plan is a foundational element of information security and a core concept to all information security frameworks (e.g., ISO 27001, NIST/FISMA, etc.), it’s still unusual for most SMBs/SMEs to have one. I think a big part of...