Cimcor Blog

Top 5 Network Security Risks and Threats
Top 5 Network Security Risks and Threats
It’s an unpleasant truth that businesses must face: Between vulnerabilities and the ever-changing IT landscape, network security risks continue to...
Data Security and NIST Compliance
Data Security and NIST Compliance
When hearing the words NIST Compliance,  businesses not familiar with the Federal Information Security Management Act (FISMA) terminology and...
5 Tips to Help Manage Enterprise Security and Compliance
5 Tips to Help Manage Enterprise Security and Compliance
  Creating an environment of security and compliance throughout your enterprise can be a challenge as a main goal is to effectively ensure...
5 Cybersecurity Tips to Improve Employee Habits
  Employees are a first-line defense against threats such as zero-day attacks and breaches. It is critical that they are made aware of basic methods...
The Top 5 Security Risks in Docker Container Deployment
The Top 5 Security Risks in Docker Container Deployment
Since Docker’s release in 2013, several vulnerabilities have been discovered that could lead to privilege escalation and arbitrary code execution. In...
Point of Sale Systems: Still at Risk for a Security Breach?
Point of Sale Systems: Still at Risk for a Security Breach?
Information Security Architecture: Why You Need To Review
Information Security Architecture: Why You Need To Review
 Cybersecurity and information security for an organization is top of mind for many. However, the process of how to "catch up" or stay on top of the...
The Real Price Tag of Retail Store Data Breaches
The Real Price Tag of Retail Store Data Breaches
Are retail data breaches a thing of the past? Hardly. In fact, Pricewaterhouse Cooper's (PwC) Global State of Information Security® Survey research...
The 10 Keystones of an Effective Endpoint Security Strategy
The 10 Keystones of an Effective Endpoint Security Strategy
Do you know what's on your employees' mobile devices? CyberEdge researchers believe mobile applications are the greatest risk to your company's...
5 Ways to Reduce Information Security Risk in a Mobile Workplace
5 Ways to Reduce Information Security Risk in a Mobile Workplace
Today's talent is no longer bound by the cubicle. For many, home offices and wi-fi enabled coffee shops are the new workplaces. Citrix writes that...