Cybersecurity compliance program
-
IT 101 – Application Attacks
12/20/19Welcome to IT 101, where the experts at 2W Tech will tackle a hot topic in the IT industry and break it down...
Read blog
-
In 2018, the U.S. Office of Civil Right experienced a record year for HIPAA enforcement activity. The OCR settled 10 cases and secured...
Read blog
-
When it comes to cybersecurity, a “protect everything” ethos is an easy trap to fall into. However, you have to determine if a)...
Read blog
-
IT 101 – Social Engineering Attacks
12/06/19Welcome to IT 101, where the experts at 2W Tech will tackle a hot topic in the IT industry and break it down...
Read blog
-
Even with potential fines that would cost thousands if not millions of dollars, countless companies are still fumbling their way toward compliance with...
Read blog
-
Most major companies within the US are subject to at least one type of security regulation and most have difficulty determining which regulations...
Read blog
-
Benefits of SIEM Tools
11/29/19Security information and event management (SIEM) provides insights into a corporate IT environment through functions like log management and security information management. Every...
Read blog
-
A managed security service provider (MSSP) is an IT service provider that provides an organization with outsourced monitoring and management of security devices...
Read blog
-
ITAR is the US regulatory regime to restrict and control the export of defense and military related technologies to safeguard U.S. national security...
Read blog
-
SOC for Supply Chain is on the Way
11/07/19The American Institute of Certified Public Accountants is developing System and Organization Controls (SOC) for Supply Chain to add to its suite of...
Read blog