VC3
Filter by
Blog
|
3 Min Read
Continuous Cybersecurity Monitoring vs Penetration Testing for FTC Safeguar...
3 reasons why you’ll want continuous monitoring (vs. penetration testing alone) as your primary method of meeting the FT...
Read More
Blog
|
10 Min Read
The Evolution of Artificial Intelligence in Cybersecurity
In the ever-evolving landscape of technology, few fields have garnered as much attention and intrigue as Artificial Inte...
Read More
Blog
|
3 Min Read
3 Unexpected Ways the Updated FTC Safeguards Rule Will Trip Up CPA Firms
The updated FTC Safeguards Rule now includes specific requirements that a CPA firm’s information security plan must con...
Read More
Blog
|
4 min read
IT Spending Benchmarks: Too Much, Too Little, Or Just Right
Some organizations overspend and get frustrated by a lack of return. Others sink into technical debt by underspending an...
Read More
Blog
|
1 min read
Cybersecurity Checklist for Municipalities: Where to Begin?
"Where do I begin with cybersecurity?" It's one of the most common questions we get from municipalities. To answer this ...
Read More
Blog
|
5 Min Read
10 Cloud Backup and Archiving Myths
Businesses want to protect their sensitive data, but some treat backup and archiving as an afterthought. Here are 10 myt...
Read More