ProCircular Information Security Experts Corner

Protecting the Kinds of Data Targeted by Today’s Cyberattacks

Posted by Aaron R. Warner on Oct 25, 2018 3:37:00 PM

Having the right technology should be part of your cybersecurity strategy – but it’s not the only part (and maybe not even the most important part). As an organization’s most valuable asset, investing in people to improve cybersecurity can provide a line of defense that’s tough to find from software or technology.

Read More

Topics: cybersecurity plan, Vulnerability Assessment

Getting Started with Vulnerability Assessments

Posted by Patrick Quinn on Dec 7, 2017 8:32:00 AM

More than 200 IT and technology leaders from hospitals, schools, and businesses in eastern Iowa came together last month at the Business Technology Conference in Coralville, Iowa – hosted by systems integration firm CEC (Communications Engineering Company) – to learn about new technology and how it can improve processes, profit, and efficiency.

Many types of technology were showcased at the event, but there were plenty of conversations about cybersecurity.

Read More

Topics: Cybersecurity, Data Breach, Vulnerability Assessment, Business Technology Conference

Startup Cybersecurity Strategy

Posted by Aaron R. Warner on Mar 20, 2017 9:24:18 AM
In the world of startups, cybersecurity is often an afterthought.

Not because budding entrepreneurs haven’t heard the horror stories, but it seldom ranks highly among things that directly generate cash or hurry a company to market. Like so many other priorities, cybersecurity often falls to the wayside in the early business stages.

Read More

Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training

Executive's Cybersecurity Checklist

Posted by Aaron R. Warner on Mar 13, 2017 9:55:05 AM

Cybersecurity Checklist for the Non-IT Executive:

Read More

Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training