Provided by CapinTech, a CapinCrouse Company
The Gramm-Leach-Bliley Act: What Higher Education Institutions Need to Do Now
While GLBA requirements are not new, they are now part of the required audit procedures in the Compliance Supplement. Learn about the changes, the steps you need to take, and the potential cost of noncompliance.
National Cybersecurity Awareness Month: Keep IT Going
October 31, 2019 - See how you can take your organization's cybersecurity efforts to the next level.
National Cybersecurity Awareness Month: Protect IT
October 18, 2019 - How to protect your email, facilities, and data by tightening up your processes and controls.
National Cybersecurity Awareness Month: Secure IT
October 11, 2019 - Resources and tips to help your organization “Secure IT” by adding security features and layered controls to better protect against cyber threats.
National Cybersecurity Awareness Month: Own IT
October 4, 2019 - Tips to help your organization and employees “Own IT” to reduce your risk and better protect your organization and its data, employees, and donors.
Application and Software Inventory: The Good, the Bad, the Process!
As your organization uses more software and applications, you need an effective inventory system to manage and secure what you’re using. These three steps will help you get started.
Developing a Strategy for IT Asset Management Success
IT asset management can seem like a mountainous task, but strategic planning will make the task manageable and save you headaches and sleepless nights. These steps will help you get started.
Planning Ahead for Cloud Computing Challenges
What happens when the cloud goes down or your cloud vendor is hacked? Planning ahead can help your organization stay productive during an outage.
How to Protect Your Organization from Phishing Email
The risk of employees falling victim to phishing email is rising. Here’s how to reduce your organization's risk from phishing email and respond quickly if a breach occurs.
Remote Desktop Protocol (RDP): Balancing Convenience with Security
Remote desktop protocol (RDP) is often used for working remotely and providing IT support. But while RDP provides convenience and efficiency, it also has many security implications. Take these steps to help secure it.