Category: Security
-
From NPD to the Cloud: Why Businesses Must Prioritize Cybersecurity Now
The recent National Public Data (NPD) breach, which compromised the personal information of over a million individuals, serves as a stark reminder of the ever-growing need for strengthened cybersecurity measures. As organizations increasingly rely on digital platforms to store sensitive data, the importance of cybersecurity cannot be overstated. Data breaches are no longer isolated incidents—they…
-
Essential Disaster Preparedness Strategies: Safeguarding Your Business
Discover essential disaster preparedness strategies for businesses, including risk assessment, disaster recovery plans, IT infrastructure investment, regular testing, and leveraging advanced technology. Ensure your business’s resilience and continuity in the face of natural disasters.
-
GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard
View my verified achievement from Global Information Assurance Certification (GIAC). GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard on February 14, 2024. The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders…
-
ITIL® Leader: Digital and IT Strategy was issued by AXELOS to Wylie Blanchard
View my verified achievement from Axelos. ITIL® LEADER Digital and IT Strategy (DITS) was issued by AXELOS to Wylie Blanchard on January 28, 2024. ITIL 4® Leader Digital and IT Strategy (DITS) demonstrates the individual has the practical understanding and application of crafting a digital vision and strategy, shaping and integrating IT and business strategies aligned with the…
-
Security and Privacy Best Practices for Safeguarding Member Data in Non-Profit Organizations
In today’s digital age, non-profit organizations have embraced technology to streamline their operations and enhance member engagement. However, the increasing reliance on digital platforms also brings about the critical responsibility of ensuring the security and privacy of member data. As data breaches become more prevalent and regulations evolve, it’s paramount for non-profits to implement robust…
-
Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard
View my verified achievement from ISC2. Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard on April 27, 2023. The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard…
-
Certified in Cybersecurity was issued by ISC2 to Wylie Blanchard
View my verified achievement from ISC2. Certified in Cybersecurity (CC) was issued by ISC2 to Wylie Blanchard on February 11, 2023. The vendor-neutral CC credential starts newcomers on their path to advanced cybersecurity certifications and future leadership roles. It proves to organizations that newly certified team members understand fundamental security principles and operations, network security and access controls…
-
ITIL 4® Foundation was issued by AXELOS to Wylie Blanchard
View my verified achievement from Axelos. ITIL® Foundation Certificate in IT Service Management (ITIL 4 Edition) was issued by AXELOS to Wylie Blanchard on December 25, 2022. ITIL® 4 Foundation demonstrates this individual understands the key concepts of IT and digital service delivery including the key concepts, guiding principles and practices of ITIL® 4 for service management. They…
-
The Value of Multi-Factor Authentication
Multi-Factor Authentication (MFA) is an authentication form that contains a layered approach to securing access whereby the system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. This is part of a core component of the Identity and access management policy. It increases security…