The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

What is External Vulnerability Scanning?

What is External Vulnerability Scanning?

February, 2023 | Charles IT

Is the sensitive information of your business properly protected? Cyber attacks present an increasing risk for organizations, with recent data showing that 2021 was plagued with 50% more cyber [...]

Knowing When Your Security Policies Need Updating

Knowing When Your Security Policies Need Updating

December, 2022 | Foster Charles

According to Cybersecurity Ventures' 2022 Official Cybercrime Report, cybercrime will cause global damages estimated at $8 trillion in 2023. This alarming statistic proves that having appropriate [...]

Top 10 Password Tips for Cybersecurity Awareness Month

Top 10 Password Tips for Cybersecurity Awareness Month

October, 2022 | Foster Charles

Charles IT · Top 10 Password Tips for Cybersecurity Awareness Month It's National Cybersecurity Awareness Month, which means it's the perfect time to think about data security and how you can bolster [...]

A Step-By-Step Guide to Establishing an Incident Response Plan for your Financial Firm

A Step-By-Step Guide to Establishing an Incident Response Plan for your Financial Firm

September, 2022 | Sal Marino

Charles IT · A Step-By-Step Guide to Establishing an Incident Response Plan for your Financial Firm It's no secret that cyberattacks are on the rise and becoming increasingly more sophisticated by [...]

The Strategic Outline of a vCISO Program

The Strategic Outline of a vCISO Program

May, 2022 | Foster Charles

The Charles IT vCISO program is a multi-stage project that aims to completely revamp and improve the way your business approaches data protection. It’s a great way to keep up with the ever-evolving [...]

How Following NIST CSF Qualifies You for Safe Harbor Protection

How Following NIST CSF Qualifies You for Safe Harbor Protection

March, 2022 | Foster Charles

Getting hit by a cyberattack can be devastating for any business. Not only can it cost in terms of damages and recovery, but you can be sued if the attack leads to a data breach and loss of sensitive [...]

What Is Connecticut’s Safe Harbor Law?

What Is Connecticut’s Safe Harbor Law?

March, 2022 | Foster Charles

The pandemic has proven to be a major challenge for businesses of all sizes, not only in terms of operations but also data security. With the rise in online communications and remote work, there has [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”