Blog

Selecting the Right HITRUST Assessment for Your Organization

Blog
3 minutes
October 05, 2022
You may or may not be familiar with HITRUST, so we wanted to share some helpful information about the organization and help you decide the best option for selecting the correct HITRUST assessment for your organization. ...
Read Full Post

7 Pro Tips from a Cybersecurity Consulting Firm for Awareness Month

Blog
5 minutes
October 04, 2022
In light of Cybersecurity Awareness Month, we wanted to share some tips from our cybersecurity consulting experts on how businesses can protect themselves online. Robust cybersecurity is more critical than ever, and ...
Read Full Post

Top 5 Cybersecurity Threats in 2022 (And How to Protect Your Business)

Uncategorized
6 minutes
September 26, 2022
This article looks at the top trends in cybersecurity to watch out for in the new year. The sector is fast-moving, and hackers are constantly improving their abilities on pace with cybersecurity providers. Here are some ...
Read Full Post

Outsourced Cybersecurity: What is an ESO & What are the Benefits?

ESO Services
5 minutes
September 26, 2022
With the influx of cyber-attacks in recent years, businesses are struggling to protect their data and create an updated strategic cybersecurity plan. That’s where an Executive Security team like Centurion ESO could be ...
Read Full Post

What Higher Education Institutions Need to Know to Comply With the FTC’s Safeguards Rule

Blog
8 minutes
August 04, 2022
Institutes of higher education have large databases of personal information, and many have research facilities housing intellectual property that could have high street value. However, colleges and universities may not ...
Read Full Post

What Auto Dealerships Need to Know About the FTC Safeguards Rule

Blog
9 minutes
August 02, 2022
Every industry has an extensive set of regulations to comply with. They range from rules established by professional associations, to state laws, to federal acts. Keeping track of all requirements can quickly become a ...
Read Full Post

Enhancing Production and Safeguarding Critical Infrastructure: The Importance of SCADA Cybersecurity

Blog
4 minutes
July 12, 2022
Automation is a fantastic resource to leverage when streamlining your operations, enabling 24-hour production, boosting the safety of your employees, and more. Automated machines, processes, workflows, and more are ...
Read Full Post

How to Prevent and Respond to Ransomware

Blog
6 minutes
May 02, 2022
In case you haven’t heard, cybercrime has increased by more than 600% since the start of the pandemic. That, of course, includes malware and ransomware cases—cases where digital criminals encrypt an organization’s files ...
Read Full Post

Super Bowl’s Coinbase Commercial Glosses Over Risks of QR Codes

Blog
6 minutes
February 16, 2022
Ignorance is bliss. When it comes to technology, other than emails, people aren’t necessarily trained to question the nature, intent or possible danger of various website links that our friends send us or even QR codes ...
Read Full Post

What Is DFARS? (+ Your Compliance Checklist)

Blog
6 minutes
February 07, 2022
The Department of Defense works with thousands of suppliers, contractors, and subcontractors every year; part of what keeps this exchange alive is knowing that all parties involved are securing government information ...
Read Full Post

Subscribe