Call Us: 1-866-802-9405

Category

Information Security Best Practices
Welcome to part three of our 3-part series about security and compliance. For those of you who missed part one or two, feel free to follow these links to get up to speed on this series: Part 1: Related but Not the Same, and Part 2: Compliance Means We’re Secure, Right? In the previous two...
Read More
Welcome to part 2 in our 3 part series about security and compliance. For those of you who missed part one, feel free to give it a quick read here. When the need for compliance hits your organization, many things can be involved, such as hiring outside consultant help, purchasing new hardware and software, even...
Read More
Security Vitals will be collaborating with Merit Network, Inc.’s cyber range to conduct product reviews for SC Magazine Pontiac, MI – Security Vitals has been awarded a new contract with Haymarket Media, publisher of SC Magazine. After an extensive search and review process, Haymarket Media selected Security Vitals as the firm to conduct SC Magazine...
Read More
Welcome to part 1 of our 3 part series which dives into complicated relationship between security and compliance. There are many misconceptions about information security’s relation to compliance. Compliance does not equal a sophisticated information security system, nor does having a sophisticated security posture mean you are 100% compliant with a regulation or industry standard...
Read More
There is some confusion in the information technology industry at times between compliance and information security. Being compliant with a certain set of standard controls such as PCI DSS, HIPPA, or NIST 800-171, is completely different than having an effective information security posture. Compliance does not equal security, and in turn, security does not equal...
Read More
Building an information security program in a business can be a daunting task. It can easily become over complicated and out of control. A lot of companies starting from scratch usually do not have an expert in the security field on staff. This can also lead to an increased amount of time to put this...
Read More
Train your employees One of the best defenses against information breaches to a company is its employees, and they may not even know it. Some common breaches that have occurred in companies have been linked to opening an email or not following proper security procedures.  In these cases, the best and most cost-effective way to...
Read More
Companies targeted by cyber-criminals Whether your company is a big or small enterprise, there is a good chance that it could be a target for hackers and cyber-criminals. An important operating item many enterprise companies do not budget into their annual costs, and most notably spend time on is cyber security. This is usually due...
Read More
Time is Ticking to Achieve NIST 800-171 Compliance   Your team is invited to attend our upcoming event discussing the 7 Key Steps to Help You Achieve NIST 800-171 Compliance. This presentation provides insights and details on how to effectively meet the compliance requirements before the fast-approaching Dec. 31, 2017 deadline. Attendees will gain an...
Read More
Security Vitals Shares Expertise in Mitigating Security Weakness Pontiac, MI – One of the largest threats and persistent risks to small and medium-sized businesses is the potential for a security breach. Hacks, scams, and phishing requests come in every size and shape, and are exponentially getting worse as nefarious individuals, organizations, and companies, both locally...
Read More
1 2 3