Call Us: 1-866-802-9405
Providing you with the latest information on

Security Insights

Time is Ticking to Reach NIST 800-171 Compliance

Security Vitals will host a free educational webinar to take viewers through a 7-step process on how to achieve NIST 800-171 Compliance by the fast-approaching Dec. 31, 2017 deadline. Rob Cote, CEO of Security Vitals, will present these steps on two dates: July 25 and Aug. 22 at 10 a.m. EST. Companies are well under...
Read More

Is your security linked to your business objectives?

Business objectives provide the foundational element for planning, managing, and growing an organization.  When we think about business objectives it’s very easy to focus on the obvious elements like supply chain. For organizations that make cars, designers start the process, which is followed by a complex blend of resources including parts suppliers, assembly line workers,...
Read More

Newest Partnership Puts Your Company’s Cyber Security on Lock

Security Vitals joins Duo Security MSP program to offer two-factor authentication to customers Pontiac, Mich. — Duo Security and Security Vitals have joined to provide Duo’s two-factor authentication (2FA) technology to current and future Security Vitals customers, making implementation and use of 2FA easier for IT administrators and end-users alike. As a significant step in...
Read More

Webinar with Security Vitals Informs Manufacturers of Critical Steps to Achieve NIST 800-171 Compliance

Register for Our Free Webinar Pontiac, MI – Security Vitals will host a free educational webinar to take viewers through a 7-step process on how to achieve NIST 800-171 Compliance by the Dec. 31, 2017 deadline. CEO, Robb Cote, will present these steps June 27 at 10 a.m. EST. Because NIST 800-171 demands specialized resources...
Read More

Leveraging The Value of an Information Security Risk Framework

Who Needs a Risk Framework? Ever try to take a long trip without a GPS or old school roadmap?   Think about the prospect of travelling cross country with no reference for direction…reacting to every stretch of highway and turn in the road.   Believe it or not, this is how some organizations manage information security.    Effectively...
Read More

State of Ransomware

A 2016 report by Symantec, a large security and anti-virus company, sheds light on the current environment of ransomware attacks.   One of the more interesting discoveries is that the Services sector is the most targeted area at 38 percent, followed by Manufacturing, Finance, Insurance and Real Estate.  The services sector appears to be easiest to...
Read More

New Service Offering to Prevent Manufacturing Job Loss in Michigan

Pontiac, Michigan – Security Vitals, a Michigan-based, cyber security services firm, announces the release of the Compliance as a Service (CaaS) offering to help manufactures retain their government contracts by complying with the looming NIST 800-171 cyber security standard. NIST 800-171 is a collection of technical and process controls designed to protect Department of Defense...
Read More

Balancing Shifting Priorities and Limited Resources: Part 2

Is there true accountability for technology investments? Consider past investments for InfoSec as another possible cause for waning support.  Over the past 5 years, the InfoSec industry has been flush with security technology spending driven a crowded product marketplace.  While most technologies are built on sound principles for reducing risk, they require process definition and...
Read More

Balancing Shifting Priorities and Limited Resources: Part 1

As a consulting firm that works with Information Security (InfoSec) leaders at a variety of organizations, there is a disturbing trend that has evolved in the past year.   Many of them are looking for new jobs (at other companies) or considering leaving the profession altogether.  In a field that is already short on good talent…why...
Read More

Passwords

The old saying is something like this: Passwords are like underwear. You should change them often, you shouldn’t share them and they should be mysterious. In other words, your password should be a total mystery to everyone else. With more and more of your daily activities being transitioned to the internet, your password is just...
Read More