Sitemap | Pivot Point Security
1-888-PIVOT-POINT | 1-888-748-6876 info@pivotpointsecurity.com
Talk with an Expert »
Select Page
GDPR & Privacy Shield - What They Mean for Your Business

Sitemap

The Collection #1 Data Breach—Should You Worry?

The largest public data breach ever just hit the web, with almost 800 million emails and over 21 million passwords “dehashed” and exposed as plain text. Dubbed Collection #1, this apparent amalgamation of over 2,000 breached data stores offers hackers vast potential...

9 Benefits of ISO 27001 Certification—Some You Know, Some You Probably Don’t

Are you considering ISO 27001 certification, or do you feel like you are not getting enough out of your current certification? Take a look at the benefits we see our clients realize (which we also experience ourselves) with an ISO 27001 Certified Information Security...

ABA Opinion 483 from an Information Security Expert’s Point of View

Legal firms are no strangers to regulations. But cybersecurity regulations coming from the American Bar Association (ABA)… that is a new one. The truth is, this has been coming for some time. Industry-specific regulations on privacy and cybersecurity are popping up...

To Pay or Not to Pay Your Hackers? Why There’s Really No Debate on Ransomware Response

There’s no such thing as being “100% safe” from ransomware. That’s why every organization needs safe, timely, reliable backups as part of an overall data recovery plan. If you can contain a ransomware infection and restore your data from backups, you won’t need to...

How to TPRM? Embrace the Art and Science.

Sometimes TPRM is more art than science. As a big fan of the TV show “Community” I had to take a peek at the animated show “Rick and Morty” when I learned that Dan Harmon, the creator of Community, was its co-creator. As oddness would have it, the first show I watched...

Yes: Your Law Firm Needs to Do a Business Impact Analysis

Law firms typically outsource much of their IT, and their most critical data is often cloud-hosted.  That means the data is protected and the lawyers can work remotely… so why do a Business Impact Analysis (BIA)? Why BIA is Important for Law Firms The reason is that a...

How a vCISO Strategy Can Save You Money—Because Nature Abhors a Vacuum

Aristotle once postulated “horror vacui” (nature abhors a vacuum). His idea was that empty or unfilled spaces are unnatural as they go against the laws of nature and physics. Interestingly, this applies to information security strategy as well. The Role of a Chief...

Recovery Time Objectives (RTOs) & Your Disaster Recovery Plan

Recovery Time Objectives (RTOs) are the essential starting point for determining your disaster recovery strategy.  Why?  Because you need to know which functions are most critical and how long others can be deferred, so you can make the most time- and cost-effective...

How Long Does It Take You to Patch a Critical Vulnerability?

A recent report from tCell that analyzed more than 316 million security incidents shares key data on the most common real-world attacks targeting in-production web applications. One statistic that caught my eye is that it took an average of 38 days for businesses to...

ISO 27017 vs. CSA STAR – The Two Leading Cloud Security Standards Compared 

With the exponential growth of cloud computing, organizations of all sizes need to understand their risks around storing sensitive data in the cloud, as well as investigate and implement cloud security options. To support this...