Contact us: +1.214.731.3113 /

Request Demo

blog on accountability and productivity.jpeg

The Quick Checklist For The Most Common Cyber Security Threats

Cyber security seems like a very complex issue that requires deep, and seldom available, expertise to do it right. Here is a quick checklist that our information security users have turned into a Template in CommandHound for others to use. This checklist goes after the low hanging fruit by applying the 80/20 rule.

Read More
January 11, 2018

The Top 3 Compliance Software Tools to Get ISO 27001 or COBIT Done

Deciding to implement a comprehensive information security framework like ISO 27001 or COBIT is not a trivial thing. These frameworks are comprehensive, cross-functional, broad reaching, and culture-changing. Here are 3 compliance software tools to help you through the process.

Read More
January 3, 2018

How to Get IT Security Compliance Under Control in 30 Days or Less

Have you tried to implement a comprehensive information security framework like ISO 27001 or COBIT but nobody is doing what they are supposed to do? A lack of accountability in the workplace is often the main reason.

Read More
January 2, 2018

The Top Challenges IT Professionals Face (and How to Deal with Them)

Although the IT profession covers a wide range of job descriptions and responsibilities, certain challenges facing IT professionals are universal.  The challenge is always about how to stay up-to-date with new developments while taking care of the day-to-day.

Read More
December 5, 2017

How to Use CommandHound to Actually Complete Your COBIT 5 Checklist

Corporations are constantly threatened by information security breaches. Learn how to effectively execute a comprehensive information security strategy.

Read More
October 25, 2017

How To Integrate New Technologies Without Causing a Security Breach

CommandHound has worked with clients in a variety of industries who deal with sensitive information on a daily basis.

Read More
September 28, 2017

IT Security and the Employee Offboarding Process

The worldwide cyberattacks in the news lately have worried businesses and individuals alike.  

The ransomware attacks Petya and WannaCry have affected commercial businesses, governmental entities, and individuals by the thousands. But while the media focuses on these external attacks, internal network security threats remain one of the most common problems in  security management. 

Read More
July 6, 2017

Are You an SMB? Here's How to Avoid Cyber Threats

In the wake of the UK Parliament's recent network security attack, it's clear that no matter how well-designed our IT security systems and internal controls are, there's always a risk of your organization falling victim to a cyber threat.

Read More
June 28, 2017

Use Checklists on Steroids to Ensure SOX Compliance

Headache-causing. Frustrating.  Sluggish.  These are some of the terms that go through our heads when trying to decode the complex regulatory requirements of Sarbanes-Oxley (SOX).

Read More
June 8, 2017