BLOG
What Does a vCISO do?
If you want an information and cyber security leader, but don't' want to afford or be burdened by a full-time employee, a virtual CISO can be a great solution. But without the leadership of a CISO, how do you know what the vCISO should do? It's important to note...
How Much Does a vCISO Cost?
You're in charge of protecting the company's assets and reputation. You have critical and sensitive information and you have regulation requirements you need to attest to and meet. You need someone that can manage this responsibility and lower risk without impacting...
Overlooked Benefits of Hiring a vCISO
The role of a CISO is critical within a business that has significant risk and needs to implement and maintain an operational security program. But hiring this role is expensive, and it can be hard to qualify and identify the right candidate. A...
Minnesota Cybersecurity Companies
Minnesota is a hotbed of cybersecurity talent. To access that amazing talent, you should partner with a local cybersecurity company. If you're looking to for cybersecurity help with advisory services, consulting, or initiatives and want to support local...

When to Pen Test an Application?
Cybersecurity article on when to decide to test your application by means of a professional penetration test.
How to Build a Computer Security Incident Response Plan
A Security incident handling and response plan is a premeditated plan on how you will determine, classify, and respond in an organized and prepared manner to a cyber attack that potentially impacts the business. Your goal is to reduce the impact of the incident...
4 Questions to Prevent Passive Programmer Security
Do you development software or applications internally? Photo by Émile Perron on Unsplash Support for internally developed applications can allow speed to market, customization, and even a competitive advantage. Common problems are supportability, security, and...
Best Security Controls for the Endpoint
When we consider the volume of security incidents and breaches we can see a picture that a large volume of these is hitting the endpoint. The reason is twofold; 1. Where the weakest link is = the user. 2. Administrative Rights - That asset is typically logged in with...
What Does a Minnesota Cybersecurity Advisor Do?
What is a Minnesota cybersecurity advisor? A partner to come along aside you and your organization to help formulate the most right plan to lower risk and save money for your business. The threats are overwhelming. From access privilege escalation to cross-site...
HIPAA Security for Minnesota Medical Companies
There are a lot of medical companies in Minnesota. We've all heard of the big ones, Mayo, Fairview, Allina, and the Minnesota based medical device company Medtronic. But in addition to all these large companies, there are thousands, of small and medium-size medical...