13 May Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security IT Leaders: Here’s How Your CFO Thinks January 13, 2024 By Richard Barrus When IT and cybersecurity executives sit across the table from business executives, the two groups think about organizational issues di... Continue reading
12 May Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security IT Leaders: Here’s the #1 Way to Influence Your CFO January 13, 2024 By Richard Barrus All too often there’s a disconnect between technology leaders and business leaders. We tend to talk different languages—bits, bytes and... Continue reading
11 May Cybersecurity | Category - Pivot Point Security, Third Party Risk Management MSPs – Here’s How to Choose Good Customers and Avoid the “Wildcards” January 14, 2024 By Richard Barrus It’s hard enough for outsourcers to choose the right Managed Service Provider (MSP). But how do MSPs go about finding the right custome... Continue reading
10 May Cybersecurity | Category - Pivot Point Security, Third Party Risk Management What is MSP Verify and Why Do I (as an MSP or Outsourcer) Care? January 15, 2024 By Richard Barrus If you’re shopping for an MSP, what do you have to go on besides promotional copy, seat-of-the-pants research and maybe some peer recom... Continue reading
06 May Cybersecurity | Category - Pivot Point Security, Third Party Risk Management MSPs and MSSPs: What’s the Difference? January 4, 2024 By Richard Barrus Managed Service Provider (MSP) business models have evolved from onsite, break-fix services to your-IT-department-as-a-service. Many MS... Continue reading