Top 5 Takeaways from Cybersecurity Expert Rachel Wilson

Here at Corsica Technologies, we have the privilege of partnering with Affiliated Distributors (AD), a member-owned trade organization that brings together best-in-class distributors and suppliers to facilitate dynamic business partnerships. We attended AD’s North American Meeting for their PHCP division (Plumbing, HVAC and Pipes, Valves and Fittings). It was great to meet many of you […]
CPCSC For Canadian Defense Contractors: What We Know Today

With cybersecurity threats evolving rapidly, local governments are taking steps to protect sensitive but unclassified information that they must share with their suppliers. This is a critical undertaking, as hackers can use sensitive information to inform their strategies—plus they can execute supply chain attacks by gaining access to one system, then moving upstream to compromise […]
10 Cybersecurity Trends Emerging In 2024

When it comes to cybersecurity, things are never static. So far, 2024 is consistent with this theme. We’re seeing a mix of familiar trends intensifying alongside startling new developments. From the cybersecurity skills crunch to AI-powered attacks, 2024 is shaping up to be a wild ride. So which cybersecurity trends matter most? How can your […]
4 Times Managed Detection And Response Saved The Day

You can’t respond to a cyber attack if you can’t even detect it. That’s the thinking behind MDR (managed detection and response). This service is an essential component in cyber security managed services, and it offers incredible power to stop attacks. But what is MDR? Who provides these services, and what do they look like […]
3 Essential CJIS Certifications for a Third-Party Vendor

Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit.
10 Keys To Cybersecurity For Local Government

Local governments are in the crosshairs. As larger organizations harden their cybersecurity defenses, criminals are turning to softer targets. Recent incidents like the hacking of Hendersonville, NC, or the cyberattack on the Kansas state court system only reinforce a trend that’s been growing for years. Unfortunately, local governments are often ripe for the picking. With […]
How Network Penetration Testing Can Boost Your Cybersecurity

Penetration Testing is simulated cyber attack against your computer system to check for vulnerabilities. Penetration testing is used as a risk gauge.
4 Sobering Lessons From The SEC’s Suit Against SolarWinds

In case you haven’t heard, the SEC is charging SolarWinds with fraud over its response to the devastating Sunburst cyberattack. And it’s a landmark case. For the first time in history, a government agency isn’t only pointing a finger at a company for alleged criminal conduct regarding cybersecurity. They’re going after an individual too. Timothy […]
Zero Trust For Small Business

Small businesses increasingly find themselves targeted in today’s fast-evolving cyberthreat landscape. Better-resourced organizations have become so difficult to penetrate that cybercriminals are looking for softer targets. Unfortunately, this means that regional businesses, medical practices, government agencies, and even school districts are now in attackers’ crosshairs. The best recourse for small businesses is to adopt a […]
The Nuts And Bolts Of Cybersecurity Risk Assessments

Last updated September 30, 2024. Cybersecurity risk assessments are essential in today’s threat landscape. Yet smaller organizations often struggle to assess their risk, particularly if they don’t have cyber security managed services. Without that expertise, it’s tough to know where to start. Frameworks like NIST 800-171, ISO 27001:2013, and CIS RAM all offer robust protocols […]
Establish a Vigilant Culture with a Human-Centric Approach to Cybersecurity

Oftentimes, organizations are so worried about implementing technical security controls like firewalls, intrusion prevention systems and anti-malware software that they forget about the most important security control: employees. And when it comes to cybersecurity, the employees in your organization tend to be the weakest link in your defense, so ensuring that everyone is working with—rather […]
Five Frequently Asked Questions About CMMC

If your business operations include cloud-based computing like Office 365, data loss prevention tools are a necessary defense in your IT arsenal.