Vancord logo

News & Events

Vancord x Binary Defense Live Cybersecurity Q&A Panel

Date: Thursday, Sep 22, 2022  4-6 PM
Location: Rooftop 120 @ 120 Hebron Ave, Glastonbury, CT 06033

Cybersecurity Awareness Month: See Yourself in Cyber

Happy Cybersecurity Awareness Month! Each year, the Cybersecurity and Infrastructure Security Agency (CISA) announces a theme for October; this year it’s “See Yourself in Cyber”. As we head into the month, the team at Vancord puts a twist on the theme with an informative and thought-provoking conversation on the direction they see cybersecurity heading. The overarching message is simple: cybersecurity should be at the forefront of your organization.
CyberSound ep60

Zero Trust: What is it & How Can I Utilize it?

Zero trust is an important security framework that ensures users, assets, and resources are protected from all angles. The rise of remote work has made this even more prevalent. It’s the responsibility of organizations to employ a variety of these measures in a workplace and build stronger operational systems.
CyberSound ep59

Turning the Tables on Attackers

Understanding the behavior of attackers can increase reactivity, improve your overall security stance, and give you a leg up in detecting malicious activity.

How do You Stay Secure & Compliant?

Every day, companies of all industries face complex information security challenges. While some rely on internal IT teams to support data threats and protection, many lack the guidance of a full-time Chief Information Security Officer.

CyberSound ep58

Backdoors & Breaches

Black Hills Information Security created an incident response procedure card game titled “Backdoors & Breaches” (B&B). Today, the Vancord team takes a stab at playing it.
CyberSound ep57

Untold Stories of a Cybersecurity Engineer

Working in the security space can come with unexpected challenges and events. The team at Vancord has learned how to properly handle incident response by understanding the high sense of urgency people feel in these situations.
CyberSound ep56

Finding Privacy in Public Data

What kind of data is attainable to the general public? There is information that you may deem private, like salaries, voter affiliation, and property assessor records. Fortunately, there are options for recourse and limiting the visibility of this data.

What is Cybersecurity Maturity Model Certification (CMMC)?

In our technology-driven world, there is nothing more valuable than data. 

Nearly all organizations are feeling increased pressure from governments, evolving legislation, and prime contractors encouraging businesses to implement robust cybersecurity programs to safeguard their sensitive data. Read on for tips on obtaining compliance and reducing cyber threat risks through a Cybersecurity Maturity Model Certification (CMMC).

Unpacking the 2022 Ponemon Cost of Insider Threats Global Report

There are valuable resources available to help protect your organization against insider threats. One of the larger ones released annually is the Ponemon Cost of Insider Threats Global Report.

Cyber Liability is Important, but Not the Only Step

An organization’s cyber security measures, along with an overall secure IT approach that is properly implemented and continuously enhanced can provide as much “protection” as a strong cyber liability policy.  But can it really be an alternative to costly and, in some instances, required insurance?  
CyberSound ep54

Vancord and Binary Defense: Two Business Partners in The Industry

Understanding the business market is the first step in providing successful cybersecurity services to clients. Having valued partners to collaborate with amplifies this.

One Year of CyberSound

It’s been one year since the release of our first ever episode of CyberSound! Tune in as Jason, Steve, and Matt revisit snippets of episodes this past year and share laughs and valuable lessons learned throughout the creation of this podcast.

How Do You Test Your Defenses?

In today’s highly competitive marketplace, cybersecurity is an essential part of any operation in preventing security breaches and safeguarding data. But how do you ensure the systems in place will hold up against a cyber attack? 
CyberSound ep52

Balancing Priorities of Infrastructure and Security

IT and cybersecurity are two fundamental pieces of an organization’s internet protection. But how can these respective departments work together to bring a more strategic approach to projects?
CyberSound ep51

GLBA Compliance in Higher Ed: Helping to Protect Student Financial Data

There are changing expectations in higher education for protecting student financial records. This is an opportunity for your institution to get ahead in information security as the Gramm-Leach-Bliley Act (GLBA) requirements begin to go into effect this year.
CyberSound ep50

The Cyber Journey To Protecting Sensitive Data: How Evident Must It Be?

The Department of Defense (DoD) holds security standards for organizations that handle controlled, unclassified information– particularly NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC). These standards are set to ensure protection in your business and to avoid any potential data breaches or financial impacts.
CyberSound Ep49

Economic Effects on the Cyber Industry

Today, the economic landscape is directly impacting the cybersecurity industry, which has resulted in unrest. With the current state of the job and stock markets, it is crucial to be aware of these challenges to adapt accordingly.
cybersound ep48

Tangible and Intangible Enterprise Risk

Reducing physical security risk requires great flexibility in meeting the specified needs of clients. This understanding allows experts to analyze the severity of a situation and mitigate it appropriately.
CyberSound ep47

The Hacker Personas

The modern-day internet hacker holds a strong illusion to the public eye. These are not random, lone actors— they are usually serious, organized attackers with a profit-based motive. These motives are important to understand for instilling the right cybersecurity defense mechanisms in your organization.
CyberSound ep46

Revisiting Cybersecurity Fundamentals

Are you a beginner in IT looking for simple steps to be proactive about cybersecurity? Or want a refresher on the basics of preventative maintenance online?
CyberSound ep45

The Latest: June 2022 News Segment

Open-source software (OSS) allows web developers to study, modify, and customize software to fit their needs. Historically, many organizations have felt a lack of security in these projects; however, major tech giants like Microsoft and Amazon are making significant investments today.
CyberSound ep 44

Identity Crisis: The Give and Takes of Identity-Based Authentication

With the rise of remote work and the option to work from anywhere, employees can access company data more easily than before, making identity and access management a critical security issue for businesses to consider.
CyberSound ep43

What Would You Do? The Value of Acting Out an Attack

We all know that practice makes perfect, and the same holds true when it comes to incident response in the case of a cybersecurity attack.
CyberSound ep 42

Growing Up Online: How Do I Talk to My Child About Cybersecurity?

Today’s kids are inevitably growing up online in the age of virtual learning, iPads, and the internet at our fingertips, and parents need to stay vigilant.