Cimcor Blog

Can You Detect Fileless Malware?
Can You Detect Fileless Malware?
 Known by the names of zero-footprint, invisible,  or non-malware, these types of attacks are continuing to increase at organizations over time.  Is...
How File Integrity Monitoring (FIM) Helps with GDPR Compliance
How File Integrity Monitoring (FIM) Helps with GDPR Compliance
  Ensuring General Data Protection Regulation (GDPR) compliance may be easier than you think, and the right software and systems in place can help...
Monitoring for GDPR Compliance 
Monitoring for GDPR Compliance 
  One of the most important ways to ensure compliance for the General Data Protection Regulation (GDPR) includes appointing a data protection officer...
6 Steps for GDPR Readiness
6 Steps for GDPR Readiness
Getting ready for General Data Protection Regulation (GDPR) compliance doesn't have to be the daunting task many make it out to be. If you are not...
The Cost of GDPR Non-Compliance 
The Cost of GDPR Non-Compliance 
General Data Protection Regulation (GDPR) requires additional steps that data processors and data controllers must take to protect personal data, and...
Beginning GDPR Compliance
Beginning GDPR Compliance
GDPR takes effect in May of 2018, which means time is slipping away to begin preparing your company for compliance. Not sure where to begin? Cimcor...
General Data Protection Regulation (GDPR) Definitions to Know
General Data Protection Regulation (GDPR) Definitions to Know
In the coming months, the General Data Protection Regulation (GDPR) will officially be enforced on May 25th, 2018, with heavy fines for some...
PCI DSS 3.2 Deadlines and Requirements
PCI DSS 3.2 Deadlines and Requirements
By now, many organizations have implemented PCI DSS v3.2 and though the previous version (v3.1) expired in October of 2016,  some of the new...
4 Steps to Help With Data Protection and Compliance
4 Steps to Help With Data Protection and Compliance
The protection of personal data has never been more important for organizations, but many still lag behind with securing that data. With compliance...
How Can We Conquer Cybersecurity in 2018?
The year 2017 may be known as the year of ransomware, but what will 2018 be known for? Though we cannot predict in what industry the next wave of...