View Post

What is a Vulnerability Assessment, and why do I need one?

In Assessments, Cybersecurity, Tips, Vulnerabilities by ITNS Consulting

It is important to first understand that every business, regardless of size… collects, manages, manipulates, and stores some amount of Personally Identifiable Information (PII) from its customers, partners, and vendors. That means that every business, regardless of size, has the inherent responsibility (even under law) to guard and protect not only its own proprietary data, but also the data that it collects, manages and stores from others.

View Post

What’s worse than getting hacked?

In Cybersecurity, Data Breach, News by ITNS Consulting

What’s worse than getting hacked? How about the “failure to detect intrusions” in the first place? InfoTrax Systems is just one of the latest examples of such an impressively bad security oversight. To be clear about the extent of the “oversight”, this company was breached more than 20 times from May 2014 until March 2016.

View Post

What is the Cost of Downtime?

In Tips, Vulnerabilities by ITNS Consulting

Most businesses can find a way to deal with whatever life throws at them as long as they can continue to do business. But, what happens when something impacts that ability? When a business can not continue to operate and perform normal business functions, the company’s reputation is greatly impacted. Therefore, every company’s survival greatly depends on how quickly they can return to normal operations.

View Post

Free Resources from ITNS Consulting!

In Cybersecurity, Free Resources, Tips by ITNS Consulting

We’re always looking to find new ways to help our clients, prospects, and our community. One of our key objectives is focused on increasing Security Awareness within our business community through our blog posts, Security Awareness Training, and by providing helpful tools that make managing your IT systems more effective. Here are a few FREE resources you can use to assist in those endeavors…