ISSA Event: CMMC From the Sub’s Perspective

ISSA Event: CMMC From the Sub’s Perspective

Simple Helix partnered with the North Alabama Chapter of the Information Systems Security Association (NAC-ISSA) to host a virtual discussion panel event on September 15, 2020. During the event, the CMMC discussion was examined through the lens of the...
Trending Phishing Techniques & Tips for Detection

Trending Phishing Techniques & Tips for Detection

No other cyber threat plagues the world like phishing attacks. This email-borne threat action tops the list as the most used initial attack vector in data breaches today. Learn more about how to protect yourself against phishing by downloading the “Trending...
Duo’s Trusted Access Report

Duo’s Trusted Access Report

Here’s the thing, the secure perimeter as you know it is evolving. The explosion of cloud applications and mobility has expanded the concept of a perimeter security architecture, which assumes that every user and device inside company walls is secure and...
O365 Backup for Dummies E-Book

O365 Backup for Dummies E-Book

The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. This book addresses the data security challenges in today’s computing landscape by outlining the...