13 Spooky InfoSec Stats to Scare Up Resources to Improve Information Security

We understand the challenged information security professional face when it comes to gaining approval for the right security resources needed to protect sensitive employee and customer data. That’s why we’ve put together a complementary guide featuring 13 Spooky InfoSec Stats and a few tips and recommendations that will help you convince your leadership team that investing in information security is a must have.

PCI Self-Assessment Questionnaire Guide

The process to self-evaluate compliance with the PCI DSS can be complex and daunting. Digital Defense has developed the PCI SAQ Guide, an online tool that can seamlessly walk you through a wizard like system that simplifies the SAQ process, easing the burden and reducing the complexity of the self-assessment process saving time and resources.

FFIEC Guidance Meets SANS top 20 Compliance

Our team understands the security challenges faced by financial institutions and the necessity to not only meet regulatory compliance, but also to manage information security programs effectively.

While no formal industry accepted security standards exist, FFIEC and SANS information security controls offer various standard that provide benchmarks that both financial institutions and their regulators can draw upon for the development of industry expectations and security practices.

In this guide, we share practical recommendations, tips and best practices you can use to bolster security with the right vulnerability management technology.

HIPAA & Information Security | You Can’t Have One Without the Other

HIPAA_InfoSec_Guide16Healthcare providers today cannot escape the fact that HIPAA compliance is crucial to operating and providing services to patients. Understandably, most healthcare organizations are heavily staffed to focus on patient care but must have operations dedicated to compliance with HIPAA regulations. Proactive security will not only meet HIPAA requirements but will also provide a healthy program to protect patient data.

Penetration Testing: What You Need to Know Now


Penetration Testing has been around for years, but many organizations are missing the mark when it comes to utilizing this security powerhouse. Many organizations understand the need for a penetration test but are challenged with understanding the right level of risk assessment for the organization, the ROI associated and what to plan for or expect during an engagement.

12 Security Mistakes You Don’t Want to Make


In an effort to help businesses build a culture of security, we offer “12 commonly seen information security mistakes and expert insight on how to bolster security.

Cracking the Code: Your Guide to Improved Password Security

Password_Security_Thumbnail
At DDI, we believe employees are the first line of defense when it comes to protecting sensitive information and often the first place attackers go to. To combat against the attacks, employees must be equipped with innovative password security practices to help mitigate the risk of an attack.

Social Engineering Prevention Guide

Social-Engineering-Guide_Thumbnail
Social engineering is a successful way cyber criminals are infiltrating organizations. Through email, phone, online platforms such as social media and physical infiltration tactics, attackers are using manipulative techniques designed to prey on the weaknesses of basic human nature.

“Social Butterfly” Guide to Help Companies And Employees Mitigate the Risks of Social Networking

SocialMediaDangers_Thumbnail
Companies and individuals who would like to reduce the risk of a social media compromise can download DDI’s free “Social Butterfly” Guide.