News

The blame for the reaction to breaches and cyber failures is with the technology industry.

We were asked to look at how the EU GDPR is moving forward with their data protection laws, because in the world, other countries are following their lead. In this article we see that Facebook (WhatsApp) will go to court to dispute the fine. But looking more, we see the Ireland DPC was originally looking to levy a smaller fine, but they were pressured to increase it. We believe that is the future of international businesses that collect data and tie it to a person.

Read more

What can we learn from these government agencies that are failing external audits in protecting our data?

What can we learn from these government agencies that are failing external audits in protecting our data? In general, these agencies “consistently failed to implement certain key cybersecurity requirements including encryption of sensitive data, limiting each user’s access to the information and systems needed to perform their job, and multi-factor authentication”.

Read more

Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House

Every day we work within our organization to help clients achieve requirements in a CSF standard they thought was unattainable. As being discussed at the cybersecurity summit in Washington DC today is that there is a shortage of cyber expertise. True. But what can we do locally to correct the issue? Two things.

Read more

TechR2’s data security systems use multiple layers of data security and meet the requirements of the Zero Trust Security Model

Another Single Point of Failure (SPOF) breach was announced that leaked 38 million records from many companies who used the Microsoft Power Apps. If you read about the vulnerability, you will find that the software only had one layer of security and that one point of weakness was easy to bypass. This is a failure for Microsoft and for the large companies

Read more

Are you patching together your network security?

When we are discussing major networks, we think of a large system that had to be fixed that is like many organizations, both public and private. Their network had been patched together by many different businesses over the years, and the system was fragile at best. All this is because their network used the cheapest components from the lowest bidder, and they had zero redundancy and almost zero backups.

Read more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience 

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation