How to Protect Your SIM Card from Hackers
What is SIM Card Hacking? Sim Card Hacking, also known as a SIM Swap Attack, SIM Port Hacking, or SIM...
Read More3 Access Management Models and Why They’re Important
Your guide to the Bell-LaPadula, Biba, and Chinese Wall Access Management Models What is Access Management? Access Management is all about making...
Read MoreWhat’s the difference between Pen Testing, Red Teaming, and Threat Hunting?
At first glance, it seems like pen testing, red teaming, and threat hunting all seem like a fancy way of saying the...
Read MoreSecurity Baseline and Compliance Automation Webinar
A CISO’s Guide to Secure Remote Work
How to Ensure security while your Workforce is Remote Due to the recent COVID-19 outbreak, many people are now working from home for the first...
Read MoreUnderstand the role fourth-party vendors play in your risk profile
Don’t let attackers in through your fourth-party vendors Your third-party vendors have their own third-party vendors. Those are your fourth-party...
Read MoreA Day in the Life of a SOC Analyst: Part 3
This month we’re touching base with Dustin Higgins, one of MindPoint Group’s Security Operations Center (SOC) Analysts. This blog is the last...
Read MoreHow the CMMC Shows a Greater Focus on Third-Party Risk Management
A Day in the Life of a SOC Analyst: Part 2
This month we’re touching base with Christopher Generazio, one of MindPoint Group’s Security Operations Center (SOC) Analysts. This blog is the second...
Read MoreA Day in the Life of a SOC Analyst: Part 1
Learn what it is like to work at a Security Operations Center (SOC) Analyst at MindPoint Group This month we’re...
Read More5 Tips for staying secure while online shopping for the holidays
The holiday season is officially upon us. If you’re like me, you’ve long given up the days pushing through the...
Read More