1-888-PIVOT-POINT | 1-888-748-6876
Talk with an Expert »
Select Page
GDPR & Privacy Shield - What They Mean for Your Business

Sitemap

5 Critical Steps to Align Security Policy with Your Cyber Liability Insurance Policy

The growing risk and disruptive potential of cyber-attacks are making cyber liability insurance (CLI) increasingly relevant to many businesses. CLI offers a way to mitigate financial risk and (if done well) create a “safety net” to improve resilience should a data...

How Municipal Governments Can Manage Third-Party Risk

For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Based on the findings from this effort, we’ve identified those areas where many municipalities are most vulnerable and are...

Disaster Recovery Planning for Hurricane Season

June 1 marks the start of hurricane season in the western Atlantic. As the climate warms, the oceans warm which gives hurricanes more energy.  They are becoming more frequent, more powerful and more destructive. If you work in, or plan to visit an area of high...

Contingency Planning: Cyber Security Disaster Recovery in Local Government

For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Based on the findings from this effort, we’ve identified those areas where many municipalities are most vulnerable and are...

Cyber Security Training for Municipal Government Employees

For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Cyber security training has recently been a popular topic of discussion, and in this post—the fifth in our Cyber Security...

Why Businesses Struggle to Protect Knowledge Assets—and How Virtual Security Services Can Help

Ponemon Institute, in collaboration with the international law firm Kilpatrick Townsend, has just released its Second Annual Study on the Cybersecurity Risk to Knowledge Assets. This study focuses on how well organizations are “safeguarding confidential information...

Staying Safe from Local Government Malware and Social Engineering Attacks

For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Data security is a major concern for many municipal governments, so in this post—the fourth in our Cyber Security Foundation for...

NSA Says Hackers Stick to the Basics—Which is Why We Should, Too 

Speaking at the recent CyberUK conference in Manchester, Dave Hogue, senior technical director of the Cybersecurity Threat Operations Center at the NSA, flatly stated: We have sophisticated adversaries using unsophisticated means to cause great damage. In fact, I’ll...

Two Big Reasons To Choose Your ISO 27001 Consulting Firm Carefully

Editor's Note: This post was originally published in August 2013 and has been updated for accuracy and comprehensiveness. The other day one of our Lead Implementers was told a very interesting story by an ISO-27001 Lead Auditor who performs certification audits for a...

Data Backup and Encryption for Municipal Governments

For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Data security is a major concern for many municipal governments, so in this post—the third in our Cyber Security Foundation for...