ProCircular Information Security Experts Corner

Cybersecurity: Real vs. Checking the Box

Posted by Brandon Blankenship on Feb 28, 2019 3:38:00 PM

The reason we wear our seat belts is not to avoid getting a ticket from the police, but rather to avoid a potential injury in a car accident. This analogy is an easy way to describe the difference between box-checking security and real security, and it's instantly understood regardless of technical knowledge. This message resonates with executives, because they typically prefer to “get to the point” and correctly protecting their data is “the point” of cybersecurity.

Read More

Topics: HIPAA, Information Security, consumer security, Data Security, Data Protection, Vulnerability Assessment, it risk assessment, DFARS, cybersecurity plan, NIST

Protecting the Kinds of Data Targeted by Today’s Cyberattacks

Posted by Aaron R. Warner on Oct 25, 2018 3:37:00 PM

Having the right technology should be part of your cybersecurity strategy – but it’s not the only part (and maybe not even the most important part). As an organization’s most valuable asset, investing in people to improve cybersecurity can provide a line of defense that’s tough to find from software or technology.

Read More

Topics: Vulnerability Assessment, cybersecurity plan

Getting Started with Vulnerability Assessments

Posted by Patrick Quinn on Dec 7, 2017 8:32:00 AM

More than 200 IT and technology leaders from hospitals, schools, and businesses in eastern Iowa came together last month at the Business Technology Conference in Coralville, Iowa – hosted by systems integration firm CEC (Communications Engineering Company) – to learn about new technology and how it can improve processes, profit, and efficiency.

Many types of technology were showcased at the event, but there were plenty of conversations about cybersecurity.

Read More

Topics: Cybersecurity, Data Breach, Vulnerability Assessment, Business Technology Conference

Startup Cybersecurity Strategy

Posted by Aaron R. Warner on Mar 20, 2017 9:24:18 AM
In the world of startups, cybersecurity is often an afterthought.

Not because budding entrepreneurs haven’t heard the horror stories, but it seldom ranks highly among things that directly generate cash or hurry a company to market. Like so many other priorities, cybersecurity often falls to the wayside in the early business stages.

Read More

Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training

Executive's Cybersecurity Checklist

Posted by Aaron R. Warner on Mar 13, 2017 9:55:05 AM

Cybersecurity Checklist for the Non-IT Executive:

Read More

Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates