Pratum (An HBS Brand)
@PratumSecurity
Followers
225
Following
85
Media
763
Statuses
1K
Solving information security challenges based on risk, not fear.
Ankeny, IA
Joined September 2012
We are moving! Pratum’s Twitter page is joining with Heartland Business Systems. To continue receiving great cybersecurity content, news and updates, please follow @HBSTech. We will continue to provide best-in-class cybersecurity services as we join technology leader HBS.
0
0
1
Thanks to everyone who joined us at our Des Moines and Appleton events yesterday to help kick off the First Round of games! 🏀
0
1
1
When Command Business Partners pursued HITRUST CSF certification, they sought our help in navigating the industry’s most rigorous compliance process. “It’s definitely about opening up new opportunities,” Daniele Chenal, co-founder, says. Read more here: https://t.co/PQOZQxKjEk
0
0
0
The creation and maintenance of #informationsecurity policies, standards, and procedures are often overlooked by many companies. If you're not sure where to start, this article highlights four steps to take to begin the process. https://t.co/vRoBEktQKI
0
0
0
Build a solid cybersecurity plan with this free paper that highlights #bestpratices for #passwordmanagement, network management, #datasecurity, and training employees to spot #socialengineering. https://t.co/V6brn1arvZ
0
0
0
Hackers don’t hesitate in targeting schools. Attacking a school with ransomware or a DDoS attack can cause major disruptions and produce a treasure trove of personally identifiable information, bank account data or research information. https://t.co/Cy3adcmZQi
0
0
0
A special agent shares his insights on what you need to know about working with the FBI on a data breach—including steps you can take right now before a breach hits you. https://t.co/uSWj2yLeWS
0
0
0
Have you learned to leverage #informationsecurity as a #valueproposition? Here’s how one marketing company expanded its client base 33% by outpacing competitors on privacy. https://t.co/s5EbgzhYId
@QuesterMR
0
0
0
“I think one of my clients just sent $400,000 to a hackers’ account.” To help others learn from the very bad day experienced by one employee and his company, we’re providing a behind-the-scenes look at this phishing attack. https://t.co/J7bclxngT3
0
0
0
What’s your biggest #cybersecurity risk? That depends on your business. Learn how to choose a partner who tailors a risk assessment to your unique situation from our team of experts.
0
0
0
Maybe you know you need a #penetrationtest. But do you know what kind? This infographic breaks down how web app pen tests, #socialengineering and #redteaming all work together to strengthen your security. https://t.co/XpAOWCRtpK
0
0
0
Have you ever played 'Guess Who?' It turns out that discovering false positives using SIEM can be a lot like that. See how an expert SOC analyst can take the guesswork out of identifying real threats and false positives. https://t.co/9vNILZwppc
0
0
0
Looking to build a smart #cybersecurity strategy? Lay a solid foundation with a #riskassessment. Our consultants provide the baseline insights you need to make informed decisions about what to tackle first. Take a look: https://t.co/eOz9dkcW6d
0
0
0
You may never know exactly what "shadow IT" your team is using until they open up during a #riskassessment. Information Security Consultant Ben Hall shares a couple of things you'll learn about your environment when someone else asks the questions.
0
0
0
Vendors are often asked by clients to supply some sort of proof they will protect the client’s sensitive data. While this may seem like a reasonable request, knowing how much information to share and the best way to do that is important. https://t.co/p2cRhE1nqU
0
0
0
Social engineering continues to be the leading vector for cybersecurity incidents. Use this poster to remind your team that if an email seems too good to be true or it requires you to enter sensitive information, it's likely a scam. https://t.co/luHlScgwzO
0
0
0
This medical software company called on Pratum to lead the #SOC2 process their customers were demanding. Summit Imaging, Inc. wound up with a partner for creating an entire #cybersecurity roadmap. Read the case study here: https://t.co/bYADkujqOS
0
0
0
If you’ve never taken the time to create a data flow diagram (DFD) of your system, you should make that investment. In this blog, we’ll explain how a #dataflowdiagram helps ramp up your overall #cybersecurity and how to get started creating one. https://t.co/pGj9tiaLcD
0
0
0
It only takes a few seconds to trigger a chain of events that could be detrimental to your organization. This infographic breaks down how one click could quickly turn into thousands of dollars. https://t.co/L98oA3ajB4
0
0
0
Become your customers' trusted vendor of choice by showing them that you are serious about information security by attesting to your controls through a #SOC2 report. https://t.co/5kRMSHwVrH
0
0
0