Email Protection, Hospitality’s 2020

Email Protection, Hospitality’s 2020 Graphic

Whatever the field, it matters to use accurate terms. While baking, it is best not to ask for baking soda if you need baking powder. In basketball, it’s a hoop, not a ring. Coincidentally, you spar in a boxing ring (that happens to be square). In the world of data breach research, the term VERIS refers to the Vocabulary for Event Recording and Incident Sharing (VERIS). Effectively, it is a term for the thing that catalogues the other terms.

Impersonation Protection with Email Security

Impersonation Protection Graphic

Running a business is stressful enough in this economy. There was a time when you only needed to worry about a few suspicious email messages in your inbox. Now, any message could be a potential phishing threat lurking in your inbox.

Advanced EndPoint Protection and Response (EDR)

EDR Graphic

So, what is EDR? It’s a multifaceted solution that does everything modern managed antivirus (AV) can do but takes things a step further—providing greater security and (most importantly) peace of mind. These include, but are not limited to:

What is SIEM and why is it important?

SIEM (pronounced like “SIM”) stands for Security Information and Event Management. SIEM provides a real-time analysis of security through a combination of security information management (SIM) and security event management (SEM). Security Information and Event Management (SIEM) generates real-time security alerts by applications and network hardware.

EMAIL THREAT PROTECTION

Email Threat Protection

Don’t let the inbox be the weakest link in your company’s security posture. Email Threat Protection provides multi-layered filtering that permits legitimate email while keeping out malicious threats such as phishing, impersonation, malware, ransomware, and spam-type messages.

VENZA Launches Vendor Security Assessments

Vendor Security Assessments

On the one-year anniversary since the announcement of the world’s first (and still only!) privacy management solution equipped with hospitality-specific templates, the partnership between The Privacy Company and VENZA once again bears fruit. This time, they have crafted a Third-Party Management solution that assesses the security risks associated with vendors, both current and prospective. This solution provides hotel groups with an easy-to-use system for managing the many agreements they have with their vendors (e.g. MSAs, SLAs, DPAs, AOCs) and assessing each vendor’s security posture.

Webinar: Cyber Security Budgets…How Much is Right?

Cyber Security Budgets Banner

Assuming what worked in the past will work in the future has always been risky. During this current crisis, our experts will assess “The 5 Must-Haves” of the past. Are they relevant today? Are there other cybersecurity budget line items that should now be ranked as “must-haves”? And how much should organizations budget for these necessary solutions?