Services
CISO Services
Compliance Readiness
Penetration Testing
Vendor Secure™
Resources
About
Contact
Services
CISO Services
Compliance Readiness
Penetration Testing
Vendor Secure™
Resources
About
Contact
IGI Cybersecurity Blog
CMMC Compliance: What MSPs Need to Know About the Final Rule
What You Need to Know About Multi-Factor Authentication Fatigue Attacks
Achieve CMMC 2.0 Level 2 Compliance and Secure Your Ability to Participate in DoD Contracts
Navigating Third-Party Risk Management for Credit Unions
Third-Party Risk and Awareness
Navigating CMMC Compliance: A Strategic Guide for MSPs
How CISO Advisory Services Empower Your Cybersecurity and Cyber Insurance Preparedness
Strengthening Insurability Through Continuous Vulnerability Management
CMMC 2.0 Myths Debunked: Separating Fact from Fiction
Baseline Risk Mitigation: Taking Steps Towards Insurability
Link by Link: Building a Secure Supply Chain with the NIST CSF 2.0
How Penetration Testing & Managing Risk Can Help Lower Your Insurance Costs
Exploring the NIST Cybersecurity Framework 2.0: Enhanced Guidelines for Managing Modern Cyber Risk
Vulnerability Assessment vs. Penetration Test: Cutting Through the Noise
Why Cybersecurity Matters for Your Insurance Coverage
Cyber Insurance: Top 10 Ways to Reduce Risk and, Potentially, Your Premium
3 Security Risks of Generative AI and Managing That Risk
Vulnerability Assessments vs. Penetration Tests: Explained
Real World Advice on How to 'Fight the Phish' in 2023
Why Regular Penetration Testing Is Important: 6 Key Reasons
IGI Cybersecurity Weighs in on the National Cybersecurity Strategy
Meet the Cybersecurity People: Freda Briggman
Hacktivism: Does It Do More Harm than Good?
Meet The Cybersecurity People: Jenny Champeau
Penetration Tests and Still Photographs: Moving into the Future
Cyber Liability Insurance is Evolving; Prevention is Now Key for Coverage
A New Year’s Cybersecurity Resolution: Be Proactive
Do you need a CISO? The answer may surprise you.
#BeCyberSmart: Building a 'Cybersecurity First' Culture
#BeCyberSmart: Kickstart a Career in Cybersecurity
#BeCyberSmart: Real World Advice on How to 'Fight the Phish'
#BeCyberSmart: How to Bring Cyber-Street Smarts to Your Business
Meet The Cybersecurity People at IGI: Steve Mihm
The Kaseya Ransomware Attack: Next Steps for Customers
Inside the Mind of a Cybersecurity Pro: Part 3
Inside the Mind of a Cybersecurity Professional: Part 2
Meet The Cybersecurity People at IGI: Paul Robinson
Inside the Mind of a Cybersecurity Professional: Part 1
Cybersecurity Bulletin: Responding to Attack on FireEye and SolarWinds
Nodeware®: Your New Favorite Agent
The Importance of Cybersecurity as a Business Strategy
Healthcare Industry & Ransomware: 10 Steps to Reduce Risk
Cybersecurity Awareness Month: 5G and the Future of Connected Devices
Cybersecurity Awareness Month: Third Party Security Questionnaires
Cybersecurity Awareness Month: 10 Ways to Improve Your Security in October
Exploring the Origins and Evolution of Vulnerability Management
The Rise of the Virtual CISO
Look to the Future: Post-COVID-19 Pandemic Cybersecurity Predictions
When Cyber Attacks Surge in Times of Crisis
Remote Employees May be Your Biggest Cybersecurity Threat
Coronavirus and Cybersecurity: Parallels and Precautions
Learning From the MGM Breach: How to be Cloud Smart
Understanding the Cybersecurity Implications of the CCPA
Cybersecurity Negligence: How to Change the Culture From Within
Recognizing Our Own on Veterans Day
Beware of Goblins, Ghosts, and… Cheap Cybersecurity
The NY SHIELD Act Is Coming: Are You Ready?
Choosing NIST 800-53: Key Questions for Understanding This Critical Framework
The Evolution of the MSP: How to Navigate the Cybersecurity Landscape
How to Stay Secure With a Limited Cybersecurity Budget
Mergers and Acquisitions: Building a Cybersecurity Strategy
Tips on Outsmarting The Recent Google Gmail And Calendar Scam
The 6 Facets of Highly Effective Cybersecurity Teams, As Told by a Military Veteran
Social Media Phishing: How Attackers Use Popular Platforms to Target Users
Cybersecurity: What are we really protecting?
The ROI of Cybersecurity Investments: Part 2
The ROI of Cybersecurity Investments: Part 1
So You Missed the NYSDFS Regulation Deadline, Now What?
Hiring the Right Security Team: 10 Questions to Ask
Six Tips for Cybersecurity Success in 2019
Infinite Group to Sponsor New York State Cyber Security Conference June 5-6
Infinite Group Inc. to Exhibit at NYSASBO’s 70th Annual Education Summit & Expo
Infinite Group Inc. Announces Sponsorship of NYSLGITDA Spring Conference
Bad Surprises: Snow in April and Security Breaches
Infinite Group Inc. Offers Free Trials of Nodeware™ Cybersecurity Solution
What’s Causing Security Breaches and What Can Be Done
Enabling HSTS on Apache2: A Guide
Cyber Attacks Imminent in PyeongChang Olympic Games
Zyklon malware and the role of credentialed vulnerability scanning
Meltdown and Spectre attacks remind us to be prepared with vulnerability management
Protecting Your Privacy: The Importance of the GDPR Legislation
Stopping the Bad Rabbit in its Tracks
The KRACK Attack: Protecting Your Data
Nodeware Joins Telarus Supplier Team with Niche Cybersecurity Product
Infinite Group, Inc. Launches New Version of Nodeware Cybersecurity Solution, Now Available as Virtual Machine
Could the Equifax breach have been prevented?
What social media phishing looks like and how to avoid it
Shortage of cybersecurity pros leads to need for outsourced security services
Phishing scams: Don’t let your employees get hooked
Amazon Prime Day: Security tips for online shopping
Global ransomware strikes again with Petya—now what?
The Skinny on Signature-based Security Solutions
Download: NIST 800-53A rev4 Audit & Assessment Checklist - XLS ...
The-Strong-Unitrends
Legal Industry Case Study
Cybersecurity: People and the Training Evolution
‘WannaCry’ Ransomware Attacks: Preparing for the next big hit
Infinite Group Inc. Introduces Nodeware Vulnerability Management Solution