The Penn Group Blog
Posted on 9th Nov 2019 17:18:26
Protecting your organization is a 24 hour a day, 7 day a week, 365 day a year responsibility. It is not enough to “lock down” your systems and call them “secure”. You must perform continuous monitoring. Continuous monitoring is a term that stems from the United States Department of Commerce National Institute of Standards and Technology (NIST).
Posted on 8th Aug 2019 16:11:34
The biggest threat to security from the human component is the Insider Threat. An insider is typically a person who works for or with the organization and who has been fully vetted previous to being granted access to information and systems inside the company or organization. Insiders can be employees, full or part-time, they can be contractors, consultants or vendors.
Posted on 16th Jul 2019 00:44:13
When your PII is discovered by cybercriminals, it can be used to steal your identify, file false tax returns, among a host of other serious crimes. More often than not, large organizations are tasked with protecting this information. Unfortunately that doesn’t always go so well. Learn how to protect your identity.
Posted on 20th Jun 2019 00:58:19
Identity theft is a serious crime with serious consequences for the victim. Victims of identity theft usually suffer financial losses, a ruined credit, and difficulties with filing taxes. In more extreme cases, individuals may spend years cleaning up the mess.
Posted on 8th Jun 2019 16:03:03
Today, email is ubiquitous. As a virtual requirement to do business, use online services, and even buying items at a retail store, email has been cemented as the preferred communication medium between businesses and you. From a security standpoint, email is used almost exclusively as your username to any website.