Ravi Das

Ravi Das
74 POSTS0 COMMENTS
Ravi is a Business Development Specialist for The AST Cybersecurity Group, a leading security consultancy based in the Greater Chicago area. It is a boutique firm, offering all sorts of cyber services, including that of technical writing and podcasting. The AST Cybersecurity Group has been in business for 11 years, and the website is: www.astcybsersecurity.com

The Role Of The vCCO

Introduction Once you have all of your organisation’s datasets safe and secure, it is now the role of a Virtual Chief Compliance Officer (vCCO) to...

The Role Of The vPO

Introduction A vCISO is essentially an individual that fulfills the role of a direct hired CISO, but instead, they are independent contractors.  Because of that,...

An Overview Into The GDPR – Part 2

Introduction In this article, we continue with our topic of the GDPR. The Conditions Under Which A Business Can Process PII Any business that is bound by...

An Introduction To The GDPR – Part 1

Introduction As of late, one of the biggest fears amongst the American and European public was that of data privacy.  This exploded onto the scene...

The Three Top Security Solutions for The Retail, Healthcare, and Financial Sectors – Part 2

This is the one sector that is perhaps the most closely watched over in terms monitoring and safeguarding the Personal Identifiable Information (PII) of...

The Three Top Security Solutions for The Retail, Healthcare, and Financial Sectors – Part 1

Introduction Many businesses across Corporate America are now starting to reopen their doors, to both clients and employees.  But, COVID19 has taught both CIOs and...

Title: How To Protect Your Smartphone – Part 2

Introduction In this article, we continue to examine some of the remediative actions that you can take to protect your wireless devices. The Best Practices Keep up...

How To Protect Your Smartphone – Part 1

Introduction Our last two articles examined the major threats that are posed to Smartphones.  In this article, we examine some of the remediative actions that...

Part 2: Top security threats to smartphones

In this article, we continue our series on the top threats to smartphones, with network spoofing and phishing attacks. Network spoofing This security vulnerability posed to...

Part 1: Top security threats to smartphones

In this article, we start a series on the top threats to smartphones. There are a number of them, and we will be examining...