Filter by
Blog
|
3 Min Read
[Video] VC3 Answers Your FTC Safeguards Rule Questions
Cole Two Bears, VC3’s Director of Managed Security, recently discussed some of the most frequently asked questions from ...
Read More
Blog
|
5 min read
Why do hackers hack?
Everyone has an idea of what hackers do. Popular culture is full of images of hooded figures hunched over a monitor, ill...
Read More
Blog
|
4 Min Read
How Hackers Steal Information
Discover the Threat: Unveiling How Hackers Target Ohio’s Developmental Disability Organizations. Learn How to Protect Yo...
Read More
Blog
|
3 Min Read
Continuous Cybersecurity Monitoring vs Penetration Testing for FTC Safeguar...
3 reasons why you’ll want continuous monitoring (vs. penetration testing alone) as your primary method of meeting the FT...
Read More
Blog
|
10 Min Read
The Evolution of Artificial Intelligence in Cybersecurity
In the ever-evolving landscape of technology, few fields have garnered as much attention and intrigue as Artificial Inte...
Read More
Blog
|
3 Min Read
3 Unexpected Ways the Updated FTC Safeguards Rule Will Trip Up CPA Firms
The updated FTC Safeguards Rule now includes specific requirements that a CPA firm’s information security plan must con...
Read More