September 22, 2017 | Corsica Technologies

3 Essential Certifications for a Third-Party CJIS Vendor

Aligning your criminal justice organization’s practices with CJIS standards has most likely presented continual challenges. Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit. Rather than alleviating these challenges, the process of vetting outside consulting vendors and then locating additional IT and […]

September 20, 2017 | Corsica Technologies

5 Basic Steps You Can Take to Protect Your Business from Ransomware [Infographic]

Ransomware is not just “trending” among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals’ most favored tool for making fast cash from unwitting businesses of all sizes. How is Ransomware Different from Other Viruses? Ransomware is malicious code that, when accidentally downloaded and run […]

September 20, 2017 | Corsica Technologies

5 Basic Steps You Can Take to Protect Your Business from Ransomware [Infographic]

Ransomware is not just “trending” among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals’ most favored tool for making fast cash from unwitting businesses of all sizes. How is Ransomware Different from Other Viruses? Ransomware is malicious code that, when accidentally downloaded and run […]

September 15, 2017 | Corsica Technologies

3 Must-Read Articles on the Equifax Data Breach

It’s already been a week since Equifax announced the massive security breach that affected 137 million consumers. Out of the 100’s of news pieces and social media comments, here are 3 articles you should read (or re-read) to help you cut to the chase and respond effectively: 1. NBC News: The One Move to Make After […]

September 14, 2017 | Corsica Technologies

Your Next CJIS Audit: What to Expect

Every agency that uses Criminal Justice Information Systems or data is audited at least once every 3 years. CJIS policies provide complex but effective guidelines to help you uphold the freedoms of those in your care. But alas, understanding the importance of CJIS and (cue the sad trombone) CJIS audits doesn’t make compliance any simpler. Learn About […]

September 8, 2017 | Corsica Technologies

Defend Against Ransomware Attacks With Backups—But Not Just Any Backups

“Regular backups are a great way to combat ransomware attacks.” You’ve heard it said before, at the end of news stories and PSA’s about ransomware like WannaCry and Nyetya, and it’s true—in theory. Traditional backups are actually almost as vulnerable to ransomware as your business’s primary system, depending on how the two are connected. Thankfully, backup technology […]

September 6, 2017 | Corsica Technologies

What is Cybersecurity?

Cyber security, sometimes shortened to “cyber,” is the protection of computers, computer networks, and digital information from unwanted use and harm. Cybersecurity is, essentially, processes and technologies put in place by people, often trained and certified in various cyber security practices, to restrict physical and network access to devices and the data on those devices. […]

September 6, 2017 | Corsica Technologies

What’s the Difference Between a Security Incident and an Event? [Infographic]

The terms “security incident” and “security event” are used by cyber security professionals to describe potential data breaches, but what is the real difference between the two — and which one poses the most threat to your company? Security Events Happen Daily A security event is any occurrence during which private company data or records […]

September 6, 2017 | Corsica Technologies

What is Cyber Security?

Cyber security, sometimes shortened to “cyber,” is the protection of computers, computer networks, and digital information from unwanted use and harm. Cyber security is, essentially, processes and technologies put in place by people, often trained and certified in various cyber security practices, to restrict physical and network access to devices and the data on those […]