Blog

Blog

Top Five Takeaways of Information Security in 2017

The nature of information security is that it is ever evolving. As we become more technologically advanced, new challenges present themselves. The key is to never become complacent, and always keep an eye out for advancements that can protect you, your team and your clients.

 

Regulatory compliance moves at a pace that attempts to keep up with

Compliant is NOT Always Secure

 

We are PCI Certified!  How did we get hacked?!?!?
We have a 1 on our FFIEC exam and still had this data breach?
There were no exceptions on their SOC report, but our vendor still had a compromise?
 
At Garland Heart, we have heard these comments and questions time and time again.  You have definitely heard them in the news.  Entities from big

Proactive Compliance

We understand the budget restraints and "rabbit hole" you can get yourself into regarding compliance and security. How much do I do before the cost outweighs the benefit?

Oftentimes while onsite with our clients we find ourselves discussing the balance between regulations or minimum standards compared to industry best practices or trends. They

6 Key Tips for Penetration Testing in 2016

The need for penetration testing has become a fact of life in 2016. As businesses grow more reliant on online activities — and often require 100 percent effective network uptime — penetration testing remains the best way to ensure your systems are safe and secure.

However, penetration testing is definitely not a “set it and forget it” 

4 Essentials Every Company Needs for an Incident Response Plan

Behind nearly every cybersecurity breach in recent years is a business or organization that was left to grapple with the fallout. Indeed, organizations that suffer a major security incident can end up spending tens, or even hundreds of  millions of dollars  on remediation costs, fines, damages and other related expenses. However, even major breaches

5 Employee Password Habits that are Putting Your Enterprise at Risk

A truism of the modern workplace is that your employees underestimate the risk that their password habits present to your enterprise. Indeed, a study of password habits by CSID in 2012 showed that more than 60 percent of respondents used the same password on multiple sites. Even worse, nearly 45 percent of those respondents said they changed their

What The Next Security Breach Means For Your Community Bank

Recently, security breaches of major websites, companies and banks seem to be appearing in the headlines more and more frequently, and with increasingly more critical effects. If you're wondering how these events will affect you, you're not alone: in a recent survey, 97 percent of CFOs believe that cyberattacks are their biggest threat.

3 New Tips to Boost Email Security

Email may be a convenient way to communicate with coworkers and clients, but it isn’t inherently secure. As such, there are security holes in email that you should be aware of and address when applicable to data security. Here are a few advanced email hacks that can help reduce the risk and help keep your information safer in or out of the

Why Your Law Firm Will Benefit from Routine Risk Assessment

Law firms stand in a uniquely vulnerable position with respect to security breaches. Because they handle sensitive corporate information, law firms are seen by hackers as a back door to valuable information. The Journal of the American Bar Association reports, “Most major U.S. law firms have been victims of security breaches.”

Routine risk

RISK: It's Everyone's Business

Recently IBM released its 2010 Global IT Risk Study. According to the study 74% of those surveyed agreed that the greatest benefit of improving IT Risk Management is that it ensures business continuity.

The article goes on to define business continuity as more than a natural disaster preparedness plan. “It is really about building a risk-aware