Blog Posts

PCI-DSS, cybersecurity, framework Christian Grupp PCI-DSS, cybersecurity, framework Christian Grupp

Who needs to follow PCI-DSS?

When it comes to Payment Card Industry Data Security Standards (PCI-DSS), there are certain individuals and organizations that are required to follow them. These standards were created to ensure that all entities that accept, process, store or transmit credit card information maintain a secure environment and protect sensitive data.

Read More
ITIL, ITSM, change management, framework, cybersecurity Christian Grupp ITIL, ITSM, change management, framework, cybersecurity Christian Grupp

What do ITIL, ITSM, and change management have to do with cybersecurity?

A comprehensive understanding of ITIL, ITSM, and change management is essential for any organization looking to strengthen its cybersecurity posture. These frameworks provide a structured approach for managing the entire lifecycle of IT services, from design and development to delivery and retirement.

Read More
change management, framework Christian Grupp change management, framework Christian Grupp

What is a simple change management framework?

A simple change management framework is a set of processes and procedures that organizations use to ensure that changes to their systems, applications, and infrastructure are made in a controlled and orderly manner. The goal of a change management framework is to minimize disruption to business operations and reduce the risk of errors or security breaches.

Read More
ITIL, framework Christian Grupp ITIL, framework Christian Grupp

What is ITIL?

ITIL, or Information Technology Infrastructure Library, is a set of best practices and guidelines for managing and delivering IT services. It is used by organizations of all sizes and industries around the world to improve their IT operations and align them with their overall business goals.

Read More

What is the CIA Triangle in CyberSecurity?

The CIA triad is a widely accepted model in the cybersecurity industry that helps organizations ensure the confidentiality, integrity, and availability of their information systems and data. The acronym stands for Confidentiality, Integrity, and Availability, and each of these elements is considered to be the foundation of information security. In this blog post, we will explore each aspect of the CIA triad in detail and how they are essential to protecting your organization's information assets.

Read More
cybersecurity, state of, 2023 Christian Grupp cybersecurity, state of, 2023 Christian Grupp

The state of CyberSecurity in 2023

In the last few years, the cybersecurity landscape has undergone significant changes and the threats to businesses and individuals are becoming more sophisticated and frequent. As we move into 2023, it's important to understand the current state of cybersecurity and the challenges that organizations will face in the coming year. In this blog post, we will discuss the key trends and challenges in cybersecurity for 2023 and what steps can be taken to protect against them.

Read More
ITSM, framework Christian Grupp ITSM, framework Christian Grupp

What is ITSM?

IT Service Management (ITSM) is a set of best practices and frameworks for managing and delivering IT services to an organization. It is based on the principle that IT services are a vital part of an organization’s operations and must be treated as such. ITSM is an approach that focuses on delivering value to the business by aligning IT services with the needs of the organization.

Read More

What is a sample vendor due diligence process and checklist?

Vendor due diligence is a critical process for any business, regardless of size or industry. It involves thoroughly reviewing and evaluating a potential vendor or third-party partner before entering into a business relationship with them. This process is essential for ensuring that the vendor can meet the organization's needs while also maintaining the security and integrity of sensitive data. In this blog post, we will go over a sample vendor due diligence process and checklist that can be used to evaluate potential vendors.

Read More

What are some practical steps in vendor due diligence?

Vendor due diligence is a crucial process for any organization looking to establish a working relationship with a third-party vendor. It involves thoroughly evaluating a vendor's security practices, policies, and overall trustworthiness to ensure that they align with your organization's cybersecurity standards and expectations.

Read More