The State of Cybersecurity in the Healthcare Sector

The State of Cybersecurity in the Healthcare Sector

As we approach the end of the year, data breaches and ransomware in the healthcare sector continue to be a major concern for the US and other nations across the globe. The sector is particularly attractive to cybercriminals because it cannot afford downtime or lack of...
Exploring Access Control, MFA and the Principle of Least Privilege

Exploring Access Control, MFA and the Principle of Least Privilege

In this blog post, we explore Access Control – a critical component of cyber risk management and something that’s pivotal to implementing a zero-trust security model. Strong access control mechanisms form a part of all security frameworks and data privacy regulations...
CIS Benchmarks: Securing Your Operating System Configuration

CIS Benchmarks: Securing Your Operating System Configuration

A poorly configured operating system can leave your organization vulnerable to a wide range of intrusions and cyber attacks, including malware infections, unauthorized access, and data breaches. By regularly assessing systems for weak configurations and adhering to...

CYRISMA users can now assess compliance with ISO/IEC 27001!

The CYRISMA GRC module now covers ISO/IEC 27001, in addition to the eight other security frameworks and regulations that were already included. The ISO/IEC 27001 is a globally recognized security standard that helps organizations establish, implement, maintain and...