Ranking Information Security Risk

Ranking Information Security Risk

We have all seen the red, yellow, and green used on information security risk assessments to indicate high, medium, and low levels of risk. It is common with DIY security risk assessment tools used to satisfy HIPAA compliance. It’s time to retire this methodology....
Top 8 Security Risk Assessment Findings

Top 8 Security Risk Assessment Findings

We conduct dozens of security risk assessments for clients each year. It’s not surprising that we see a common pattern of issues among many of the organizations.  Below is a description of these issues and what you can do to manage the risk associated with them. ...
How to Build an Information Security Program

How to Build an Information Security Program

Executives and board members realize the importance of building a strong information security program.  Current efforts to protect information are now subject to more scrutiny by their customers, insurance companies and the government.  Ransomware and cyber-attacks...
S2Score

S2Score

S2Score is a comprehensive, risk-based measurement of information security assigned to your company based on a proven and thorough assessment process. Once completed, it will identify critical vulnerabilities, control gaps/ deficiencies, and applicable threats to the...