Mobile Endpoint Security: Managing Devices in Security Situations

Large enterprise organizations, federal contractors, and SMBs alike wrestle with security and compliance on a daily basis. Often, the demands of responsive business operations run up against the demands of risk management, governance, and compliance in regulated industries like government, healthcare, and finance. This is no more true than when it comes to mobile devices and mobile endpoint security.

Read More

Compliance and Risk Management in the Spotlight: Lessons Learned from the SolarWinds Hack

Solarwinds security breach

We recently wrote an article discussing, briefly, a data breach for the security firm FireEye. At the time, FireEye claimed that the breach was the result of a foreign attack, a state-sponsored cyberattack, an event that has unfortunately become the norm in 2020. As we, along with the rest of the country, have learned the FireEye breach was connected to the massive SolarWinds hack, one that many are calling one of the largest security breaches in U.S. history. 

Here, we’ll talk about some of the basics of the attack, including how it happened and its impact. The lessons we can learn from the SolarWinds hack can emphasize just how important risk management is for companies large and small across the U.S.

Read More

What Managed Service Providers Should Know About SOC Compliance

managed security providers security compliance

Some security regulations and recommendations, like FedRAMP, FIPS, or HIPAA, are required of any managed service providers working in specific industries like government or healthcare. Others, like Service Organization Control (SOC) compliance, are not always necessary but help demonstrate that security controls are in place to protect client data. Because of this fact, they are an essential part of an MSPs auditing structure.

Learn more about why your MSP should be using SOC auditing and compliance as part of its business model.

Read More