It's natural for an organization to plan for success. However, that success could all be for nothing if you don't also plan for worst-case scenarios, especially breaches to your information technology systems. Continuity of operations and disaster recovery plans are essential for taking proactive action against the very real threats to data
In September, Yahoo became the latest company to admit it had a serious data breach. A suspected state-sponsored hacker had compromised the user data, which included security question answers, passwords, phone numbers and birth dates, of 500 million accounts. Many Yahoo users also trusted the company with their bank account and credit card
If you don't know much about the world of cybersecurity, some of the terms professionals use may seem a bit opaque. Many people don't know what vulnerability assessments or penetration tests are, and they may conflate them. A vulnerability assessment is a scan of your network that detects security vulnerabilities, while a penetration test
If you blinked, you might have missed it. Nestled back in September's headlines, there was a little news item that indicates how much the world has changed. In the face of new cyber threats, the U.S. government took an important first step toward getting hacking under control: they announced that Gregory Touhill, a retired Air Force
In June 2016, the Financial Accounting Standards Board (FASB) issued an Accounting Standards Update designed to give investors and other financial statement users more timely information about credit losses on loans.
Under the Accounting Standards Update (ASU), all banks and financial institutions that issue loans or lines of credit must now
Legal firms face a range of security threats, from theft of sensitive data to malware that can wreak havoc on company computer systems. Penetration testing allows legal firms to test their information security systems to ensure they can stand up to the latest threats. The official definition of a penetration test is that it is a planned, legal
Garland Heart is thrilled to announce the launching of our newly designed website -www.garlandheart.com
Take a look around and see what you think. This new website has a complete new look and feel that will make it easier to navigate and more user-friendly. Try clicking on the pulsing HEART next to our logo!
Garland Heart wants to be a
The modern digital age is more convenient than ever. Not only can you walk around with a tiny supercomputer in the palm of your hand, you can use that supercomputer to connect to the entire world over the internet, with multiple options for network protocols. However, when it comes to the cybersecurity of your mobile devices and the data they
When it comes to optimizing your software organization’s security regime, you’re probably used to focusing on end products and your own infrastructure's regulatory compliance concerns. While your software-supply chain probably isn’t the number-one place you think of when you’re planning to hone your security measures, it’s still a vital cog in the
We are thrilled to announce that Garland Heart has made it to the Inc. 5000 fastest growing companies list. What an honor! Inc. 5000 ranks companies by overall revenue growth over a three-year (2012-2015) period. We are humbled and proud to anounce that we ranked #3060 with 111% growth for 2016.
Obviously our CEO/Owner, Brad Garland, is very