by deb_infosec | Nov 14, 2023 | Threats
In an era where digital information is king, the recent data breach at McLaren Healthcare serves as a stark reminder of the vulnerability of our personal data. In this incident, over 2 million individuals were impacted, marking it as one of the most significant...
by deb_infosec | Mar 8, 2023 | Compliance
A business continuity or incident response table top is a simulated scenario-based exercise designed to test an organization’s ability to respond to a potential crisis or disaster situation. The exercise typically involves a group of key stakeholders and...
by deb_infosec | Feb 28, 2023 | Compliance
SOC2 (Service Organization Control 2) has become the de facto audit requirement for the cloud in the commercial space. Whether your company has a SaaS product or you are evaluating a cloud service offering, you need to understand what SOC2 is and how to evaluate a...
by deb_infosec | Feb 25, 2023 | Threats
Holiday Inn Ransomware Attack One thing is for sure, you don’t want to be a victim of ransomware. Almost daily, there is another breach and ransomware was deployed as part of the hack. For instance, the Holiday Inn or IHG hack is another example of not being...
by deb_infosec | Feb 20, 2023 | Cloud
Here are the best practices for securing cloud serverless architecture: Implement proper access controls: Use identity and access management (IAM) to set up fine-grained permissions for resources and APIs. Secure data in transit and at rest: Encrypt sensitive data and...