💡 EXCLUSIVE Resource: GenAI Policy Template Download Now AI is now embedded in the vast majority of enterprises. That’s not a projection. That’s today’s reality. But universal AI adoption hasn’t been matched with universal control. The same benchmark that confirms AI’s

Cybersecurity
Azure Sentinel SIEM Trial
Azure Sentinel: New Microsoft SIEM almost free to trial 2019 is the year to invest in learning about Azure Sentinel. A key reason: during the Public Preview period Azure Sentinel services are provided at no extra charge. The economic motivation:

Cybersecurity
Cybersecurity Life Cycle
Corsica Cybersecurity is dedicated to protecting client’s networks, their data and business operations from cybersecurity interruptions. We offer a full life cycle of cybersecurity. Our five-step process ensures you and your data is protected.

Cloud Technology
An Overview of Azure Site Recovery
Microsoft introduced Azure Site Recovery (ASR) in 2014. This Disaster-Recovery-as-a-Service offering allows on-premises workloads to be replicated into Azure, or another datacenter, to allow for rapid failover in the event of a major outage. At the time the service was

Cloud Technology
Azure Log Analytics: The Best ‘Syslog’ Destination
A common business requirement of many enterprises is the forwarding, collection, and analysis of syslog messages. In practical terms, this means central event log storage and processing for most all network gear except Microsoft Windows Server and applications which have

IT Compliance
GLBA: Proposed Changes
On March 5th, the Federal Trade Commission proposed amendments to the Safeguards Rule and Privacy Rule under the Gramm-Leach-Bliley Act (“GLBA”).

Cybersecurity
Demystifying Cybersecurity for Small Businesses
With all the talk surrounding cybersecurity, it is easy for the owner of a small business to be overwhelmed. The good news is that you don’t have to feel overwhelmed. While there are no magic bullets, using a layered approach

Cybersecurity
Supply Chain Attacks
Supply chain attacks are on the rise and putting many companies at risk. Microsoft and F-Secure Service Technology have provided statistics that show these types of attacks are on the rise and are causing billions of dollars in losses to

Cybersecurity
10 Signs Your Microsoft 365 Account May Be Hacked
Is your Microsoft 365 Hacked? Have you noticed unusual-suspicious activity? Corsica provides 10 signs that your M365 account is hacked.

Cybersecurity
Does Security Monitoring Make You More Secure?
Recently, I was asked, “Does security monitoring make you more secure?” Aside from the obvious qualitative benefits, this question immediately prompted my curiosity to see exactly how much risk is reduced. As a provider of security monitoring services, we are

IT Compliance
South Carolina Insurance Data Security Act: A Guide to Compliance
Effective as of January 1, 2019, the South Carolina Insurance Data Security Act (the “Act”), (2017 S.C. Act No 171, R. 184, H. 4655), was signed into law on May 3, 2018 by Governor Henry McMaster. This made South Carolina

Cybersecurity
GDPR Data Protection Guide
In a previous article, I reviewed several critical GDPR requirements. In this article, I want to discuss the Data Protection mandate. Data Protection is Your Responsibility GDPR requires organizations to implement “appropriate” technical and organizational measures to protect data and

Cybersecurity
6 Reasons Why Businesses Should Upgrade to Windows 10
End of life for Microsoft Windows 7 occurred in January, meaning support, security patches or service is available, time to make the switch.