Cimcor Blog

Jacqueline von Ogden

Since 1999, Jacqueline has written for corporate communications, MarCom agencies, higher education, and worked within the pharmacy, steel and retail industries. Since joining the tech industry, she has found her "home".

4 Ways to Improve Cybersecurity Posture
4 Ways to Improve Cybersecurity Posture
Cybersecurity threats present a growing and dynamic challenge for businesses of all sizes. Unfortunately, they are commonplace occurrences as Forbes...
Managing Vulnerabilities and Staying Compliant
Managing Vulnerabilities and Staying Compliant
Inadequate and ineffective technologies are often the culprit behind the failure of compliance mandates and initiatives for many organizations....
Cimcor Interview for Hot 150 Cybersecurity Companies
Cimcor Interview for Hot 150 Cybersecurity Companies
In a recent interview with Lakeshore Public Radio producer and host Chris Nolte, Robert E. Johnson III, shares his thoughts regarding Cimcor's...
4 Reasons Why Change Control is Necessary
4 Reasons Why Change Control is Necessary
Change Control and Change management are not just buzzwords. Though many organizations tend to think of change control as more of a concept, in...
Top 5 Network Security Risks and Threats
Top 5 Network Security Risks and Threats
It’s an unpleasant truth that businesses must face: Between vulnerabilities and the ever-changing IT landscape, network security risks continue to...
The Struggle With Cloud Security
The Struggle With Cloud Security
Organizations continue to feel frustrations and concerns as more data advances toward the cloud. Just as vulnerabilities and data security evolve,...
9 PCI Myths That Can Cost CIOs
9 PCI Myths That Can Cost CIOs
As breaches continue to happen, the adage of not if but when continues to ring true. The following 9 myths regarding PCI compliance are worth a...
Making Sense of FISMA Compliance
Making Sense of FISMA Compliance
Government-affiliated entities and organizations continue to be targets for IT security as they handle both classified government information and a...
CJIS Requirements: What Businesses Need to Know
CJIS Requirements: What Businesses Need to Know
The advancement and evolution of cloud computing over the years has created challenges when it comes to data security, compliance and incident...
5 Takeaways on Cloud Security
5 Takeaways on Cloud Security
While those in IT are sold on moving to the cloud, they’re equally deterred by the security threats. Time is of the essence. According to CSO, more...