Blog

Tennessee Information Protection Act: What You Need to Know

Tennessee passed a law called the Tennessee Information Protection Act… Read more »

Blog

6 Essential Steps for an Effective Cybersecurity Risk Assessment

How do you get a comprehensive evaluation of your company’s vulnerability level? And, where do you start? Let’s look at some answers to these questions using the NIST 800-30, as it outlines six steps for an effective cybersecurity risk assessment.

Blog

What should be considered from a cybersecurity perspective before entering an acquisition?

Due diligence is very much like a home inspection when… Read more »

Blog

Information security due diligence in a potential acquisition

While evaluating the target company’s financial statements and other key indicators, it’s also important to assess the firm’s cybersecurity risk exposure.