by David Leech | Mar 22, 2023 | Blog, Security
The recent clamor of legislative activity on Capitol Hill contains several common themes as the government branch makes moves to secure the U.S. cyber environment and solidify cybersecurity law. The most noticeable is a recognition that voluntary action in the cyber...
by David Leech | Mar 15, 2023 | Blog, Security
What is zero trust? The term zero trust is becoming more commonplace, with virtually every vendor claiming their products support a zero trust architecture (ZTA) or zero trust network architecture (ZTNA). Much of the buzz is driven by Executive Order 14028, which...
by David Leech | Mar 1, 2023 | Blog, Security
Why we should all care and take notice Over the last three to five years, there has been a steady increase in the number of legislative and regulatory rules in the cybersecurity and data privacy domains. These range from presidential executive orders and memoranda to...
by Eric Bell | Jan 31, 2023 | Blog, Security
Every business has a mission statement, at least every business I have been involved with over the last 30 years. At CBTS, for example, our mission statement is “To deliver unparalleled products, services and experiences to customers, where they work and live.” And to...
by John Bruggeman | Jan 5, 2023 | Blog, Security
When your company starts to think about a digital transformation, they must consider how they will secure the data that is critical to the business. The strategic benefits of a digital transformation can quickly be lost if the data you are storing in the Cloud or on...
by Mike Wiener | Nov 10, 2022 | Blog, Security
For many organizations, multi-factor authentication—or MFA—is the first line of defense against the chance that an employee’s credentials have been compromised. If one of those credentials is compromised, the unauthorized user will fail subsequent tests and be blocked...
Recent Comments