Thought Leadership

Recommended Security Practices

It seems like every day we read about a new hack where somebody has lost personally identifiable information.   

There are primarily three reasons why these breaches are successful;

  • inadequate information security policies requiring best practice security credentials, or
  • inadequate policies requiring keeping their software and environments patched with new releases of software from their vendors, or
  • having good policies but ignoring them.

Click below to listen to John Burgess discuss basic security policies

If you’re interested in assessing your company’s IT security policies or need help shoring up your infrastructure, send us an email, or give us a call @ 800.550.2052

  • Industry

  • Category

  • Regulation

  • Solution