Are your third-party vendors leaving the door open to hackers?

Are your third-party vendors leaving the door open to hackers?

In every arena, smart enemies choose the path of least resistance. In the data security realm, that path increasingly goes through third-party vendors and subcontractors. Secure Halo shared its thoughts on this subject in an article for Help Net...
Cybersecurity: ‘Best of Breed’ May Not Be Best for Small Businesses

Cybersecurity: ‘Best of Breed’ May Not Be Best for Small Businesses

There isn’t a “one-size-fits-all” solution when it comes to cybersecurity, especially for small businesses with unique needs and specific resources. Read the insights of Natalie Lehr, co-founder and Vice President of Secure Halo, in an article for...
Evaluating Cyber Risk for U.S. Critical Infrastructure Assets

Evaluating Cyber Risk for U.S. Critical Infrastructure Assets

For U.S. critical infrastructure businesses, such as utilities, telecommunications and water suppliers, the threat of cyberattack is a growing and persistent concern. Read the Property Casualty 360 article written by Natalie Lehr, co-founder and Vice President of...
Cyberinsurance: What It Is and Why Every Business Needs It

Cyberinsurance: What It Is and Why Every Business Needs It

Cyberinsurance should not be viewed as a replacement to enterprise security, but it can serve as an additional layer of protection. Natalie Lehr, co-founder and Vice President of Product Development for Secure Halo, shared her thoughts on this subject in an article...
Responding to a PHI breach with new technology, priorities

Responding to a PHI breach with new technology, priorities

After a breach at Ferris State University where students’ protected health information was compromised, the university chose to work with Secure Halo and its holistic cybersecurity assessment tool. Read more about how TSC’s assessment helped Ferris State...