PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

2024 Executive's Guide to Cybersecurity Preparedness

Posted by Aaron R. Warner on Mar 1, 2024 2:12:00 PM

Cybersecurity: Not Just for Techies Anymore

Read More

Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training

How things stand: a cybersecurity recap of 2019

Posted by Aaron R. Warner on Dec 19, 2019 2:00:00 PM
Read More

Topics: Cybersecurity, Network Security, Information Security, Vulnerability Assessment, Penetration Testing, Incident Response, it risk assessment

Cybersecurity: Real vs. Checking the Box

Posted by Brandon Blankenship on Feb 28, 2019 3:38:00 PM

The reason we wear our seat belts is not to avoid getting a ticket from the police, but rather to avoid a potential injury in a car accident. This analogy is an easy way to describe the difference between box-checking security and real security, and it's instantly understood regardless of technical knowledge. This message resonates with executives, because they typically prefer to “get to the point” and correctly protecting their data is “the point” of cybersecurity.

Read More

Topics: HIPAA, Information Security, consumer security, Data Security, Data Protection, Vulnerability Assessment, it risk assessment, DFARS, cybersecurity plan, NIST

Protecting the Kinds of Data Targeted by Today’s Cyberattacks

Posted by Aaron R. Warner on Oct 25, 2018 3:37:00 PM

Having the right technology should be part of your cybersecurity strategy – but it’s not the only part (and maybe not even the most important part). As an organization’s most valuable asset, investing in people to improve cybersecurity can provide a line of defense that’s tough to find from software or technology.

Read More

Topics: Vulnerability Assessment, cybersecurity plan

Getting Started with Vulnerability Assessments

Posted by Patrick Quinn on Dec 7, 2017 8:32:00 AM

More than 200 IT and technology leaders from hospitals, schools, and businesses in eastern Iowa came together last month at the Business Technology Conference in Coralville, Iowa – hosted by systems integration firm CEC (Communications Engineering Company) – to learn about new technology and how it can improve processes, profit, and efficiency.

Many types of technology were showcased at the event, but there were plenty of conversations about cybersecurity.

Read More

Topics: Cybersecurity, Data Breach, Vulnerability Assessment, Business Technology Conference

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates