Author: Grant Gilliam

Understanding the Difference Between Vulnerability Scans and Vulnerability Assessments

In today’s rapidly evolving digital landscape, cybersecurity is more critical than ever. With businesses relying on technology to drive growth, safeguard data, and maintain operations, securing systems and networks from potential threats has become paramount. Two terms that often come up in cybersecurity discussions are “vulnerability scan” and “vulnerability assessment.” Though these terms may sound…

Understanding the Difference Between a Security Event, Incident and Breach

I was on a call the other day discussing security incident and breach response. One of the things that we both highlighted is the difference between an event, incident and breach. Confusing these three could land you in a lot of trouble. What is an Event?                                                                                          According to NIST, an event is any observable occurrence…

Keeping Your Business Secure

Small businesses are not exempt from cybersecurity threats. Here are some key facts about cybersecurity and small businesses: Laws both from the federal government and the state call for reasonable security. Relevant Federal Cybersecurity Law Relevant Oklahoma Cybersecurity Law Tips to Remain Secure:

The Importance of Security Certifications: CISSP, CISM, and CRISC

In the ever-evolving field of cybersecurity, organizations are increasingly relying on certified professionals to protect their digital assets and maintain robust security systems. As cyber threats continue to grow in sophistication and frequency, having a highly skilled and knowledgeable security team has become paramount. One of the most effective ways to demonstrate this expertise is…