by Amber Smith | Jan 23, 2023 | Business, Data Security and Protection, Technology
We’re all aware of the term “use by date.” It’s used when talking about food and medications, and it refers to the date after which the product is no longer safe to consume. However, did you know that your software and hardware can expire too? This is...
by Amber Smith | May 5, 2022 | Business, Data Security and Protection, Security, Technology
Password protection is the best place to start if you want to ramp up your cybersecurity. Setting a password to secure an entity’s data is called password protection. Only those with passwords can access information or accounts once data is password-protected....
by kensatkunam | Oct 20, 2021 | Business, Business Continuity and Recovery, Security, Technology
Although ransomware has long been a serious concern for business owners all over the world, the COVID-19 pandemic has created new opportunities for this threat to flourish, and the attack vector is likely to become even more dangerous in the coming years....
by kensatkunam | Nov 14, 2018 | Business, Data Security and Protection, NorthStar News, Security, Technology
Brandon Haggerty, CISSP, GCWN Director of Security and Professional Services BA St John’s University MS Minnesota State University – Mankato NorthStar is pleased to announce that Brandon Haggerty, CISSP has joined NorthStar in a full-time capacity as of...
by kensatkunam | Oct 4, 2018 | Data Security and Protection, NorthStar News, Security, Technology, viruses
FISASCORE is a comprehensive, risk-based measurement of information security assigned to your company based on a proven and thorough assessment process. Once completed, FISASCORE will identify critical vulnerabilities, control gaps/ deficiencies, and applicable...
by kensatkunam | May 29, 2018 | Data Security and Protection, malware, Security, Technology, viruses
We conduct dozens of security risk assessments for clients each year. It’s not surprising that we see a common pattern of issues among many of the organizations. Below is a description of these issues and what you can do to manage the risk associated with them. ...