Blog

Couple shopping for the latest tech, theoretically including Network Access Control (NAC).

The State of Network Access Control

When it comes to controlling access to your network, there are three data points that are more important than any others. Knowing who accesses, what accesses and where your network is accessed from is critical to its continued security. A … Read More

Employee wrapped in caution tape representing an internal threat. Demonstrating the need for the Zero Trust model to protect against internal threats.

Insider Threats and the Zero Trust Model

In a world where the threat of attack from trusted insiders and penetrating outsiders within your network has increasing impact, you need to secure not only the borders of your organization’s network to defend against outside threats but the inside … Read More

Hacker reaches hand through computer to simulate a phishing attack.

Prevent Phishing Attacks, Keep Your Organization Safe

Prospective college students know the anxiety of waiting for college acceptance letters well. Unfortunately, the hackers behind one of the latest phishing attacks knew this too. According to the Chronicle of Higher Education, hackers sent prospective students at three colleges … Read More

A man working at a laptop displaying a login screen with a shadowy figure in the background.

How Cybersecurity Varies Between Industries

Cybersecurity is a critical issue for modern industries, but some industries have different needs than others. This is due to factors that vary between industries like motivation, attack vectors, regulations and organizational structure. Learning about these differences may help organizations … Read More

Banks of All Sizes Should Prepare for Cyber Attacks

While cyber attacks on large international banks attract most media attention, small banks are also at risk. A study from the Ponemon Institute and Accenture found the average number of breaches per financial services company was 125 in 2017. In … Read More

Five Tips to Prepare for a Cybersecurity Audit

Learn Impulse’s five tips to making cybersecurity audits as simple as possible. Plain Text Version 5 TIPS TO PREPARE FOR A CYBERSECURITY AUDIT Are you implementing and enforcing everything in your cybersecurity plan? To ensure your audit goes smoothly, here … Read More

How to Test Your Software’s Accessibility

Accessibility is not only a concern for physical spaces but virtual ones as well. Whether your organization has a software-based product or just a website, it’s important to consider software’s accessibility. 1.      Consider Legal Requirements Not only can inaccessible software … Read More

How to Protect Digital Assets from Natural Disasters

With the effects of Hurricane Florence, the need to prepare for natural disasters is clear. The National Oceanic and Atmospheric Administration (NOAA) reported that natural disasters caused $87,377.50 million worth of US property damage in 2017 alone. Yet, not just … Read More

How to Choose the Best BYOD Policy

Computing devices are everywhere. According to the Pew Research Center, 77 percent of Americans own a smartphone and that is not even taking into account PCs, tablets, and wearables. With how common these devices are, their presence in the workplace … Read More