Category: Blog

Blog

How to Get Started on the DoD’s CMMC Certifi…

Updated July 15, 2020 With more than 300,000 Department of Defense (DoD) companies and subcontractors essential to military operations, the defense industrial base (DIB) is a frequent and valuable target for malicious cyberattacks. Potential breaches of intellectual property in this sector could weaken U.S. defense cap…
Blog

Building Operational Agility in Healthcare: Focus …

If the past few months have taught us anything, it’s that healthcare organizations need to be able to scale – quickly, securely, and with patient care at the forefront. The key is operational agility. Operational agility is the ability to respond quickly to changing external conditions, without compromising long-te…
Blog

The Name of Your SOC Matters: Tips for Picking a N…

Focal Point has worked with a number of security operations teams, helping them advance their capabilities, execute on their strategies, and strengthen their skills. More often than not, we’re brought in because stakeholders don’t feel like their security operations are meeting the needs of the organization. When w…
Blog

The Countdown to CCPA Enforcement

The Covid-19 pandemic brought much of the world to a standstill, but one thing it has not impacted is the enforcement date for the California Consumer Privacy Act (CCPA). The CCPA, which went into effect on January 1 of this year, grants California residents new privacy rights for their personal information and is cons…
Blog

A Free Covid-19 Cyber Awareness Email Template

Since the end of February, phishing emails have spiked by over 600% as cyber attackers look to capitalize on the stress and uncertainty generated by the Covid-19 pandemic. The attackers behind these malicious emails typically pose as a trusted organization or a legitimate source (i.e., World Health Organization (WHO), …
Blog

3 Key Risks Threatening Cloud Security in 2020

For years now, organizations have resisted moving key enterprise systems to the cloud because of their concerns around cloud security. However, the idea that cloud offerings like IaaS, SaaS, and PaaS lack strong security controls is myth. In fact, Gartner posits that public cloud service providers (CSPs) are even more …
Blog

7 Tips for Securing Your Privacy on Video Conferen…

Note: In late May, Zoom released version 5.0 of its videoconferencing platform, which addresses a number of security and privacy concerns. A list of these updates can be found here: https://zoom.us/docs/en-us/zoom-v5-0.html. The Covid-19 pandemic has restricted the movement of millions of people, and many companies hav…
Blog

What You Need to Know about Brazil’s New Persona…

Updated April 10, 2020 The implementation of the EU’s General Data Protection Regulation (GDPR) unleashed a wave of new privacy legislation across the world, spreading across the Atlantic to Brazil. On August 14, 2018, the Brazilian Federal Senate signed the Brazilian Personal Data Protection Regulation, referred to …
Blog

Cookies and Compliance: How Key Data Privacy Regul…

Using online cookies has become ubiquitous among organizations across all industries due to their ability to enhance and simplify user experience and to inform the business on its client base. However, since cookies allow businesses to track, store, and share user behavior, cookies are now the source of privacy concern…