Cyber Security

February 8, 2021
Ascension Facing Consequences from the FTC After Failing to Follow Safeguards Rule

In this blog, we give an overview of a recent violation of third-party vendor requirements for financial institutions. In this blog, we...

Read More
February 1, 2021
4 Types of Phishing and How to Protect Your Organization

What is Phishing?  Phishing is a prevalent type of social engineering that aims to steal data from the message receiver. Typically, this data includes personal information, usernames and passwords, and/or financial information. According...

Read More
January 11, 2021
A Day in the life at MPG: HR Generalist

What’s it like to work in HR for a cybersecurity consulting firm? This month we’re interviewing Perla Salazar, a member of...

Read More
December 15, 2020
A Day in the life at MPG: Cybersecurity Analyst

cybersecurity a

Read More
December 4, 2020
FedRAMP, FISMA, and SOC 2… What’s the Difference?

FedRAMP vs. FISMA vs. SOC 2: Similarities and Differences FISMA, FedRAMP, and SOC 2 are common IT Security terms, often bandied around interchangeably by...

Read More
October 14, 2020
A Day in the life at MPG: IT Security Policy Analyst

What It’s Like to Work as a Security Policy Analyst This month we’re interviewing Addie Clark, an IT Security Policy...

Read More
October 1, 2020
Public Sector on Air: Cybersecurity, Compliance, & Automation with Red Hat

Public Sector on Air features Red Hatters, partners, and customers from public sector entities talking about common problems that need...

Read More
September 15, 2020
How to Protect Your SIM Card from Hackers

What is SIM Card Hacking? Sim Card Hacking, also known as a SIM Swap Attack, SIM Port Hacking, or SIM...

Read More
June 22, 2020
A Day in the life of a Business Development Manager at MindPoint Group

What is it Like to Work on the MindPoint Group Growth Team ? This month we’re interviewing Ben Strauss, a...

Read More
April 28, 2020
How to Hack Through a Pass-Back Attack: MFP Hacking Guide

A Pen Tester’s Guide to Printer Hacking What is an MFP and MFP Hacking anyway? Multi-Function Peripherals (MFPs) are an...

Read More
April 21, 2020
Security Baseline and Compliance Automation Webinar

How to Overcome Compliance Barriers with Security Automation Webinar Overview: We’ll be honest with you, compliance is hard. Between shifting...

Read More
April 3, 2020
A CISO’s Guide to Secure Remote Work

How to Ensure security while your Workforce is Remote Due to the recent COVID-19 outbreak, many people are now working from home for the first...

Read More
12 3 4