Guides Archives · Page 3 of 3 · American Technology Services

Guides

Get access to ATS guides covering a range of topics such as IT strategy, cybersecurity, compliance, and more. Download for free today.

Begin Your Privacy Program with These Steps

Although you may not have a regulatory or legal obligation to establish a privacy program for your organization, it is in your best interest to consider how good data practices and privacy will need to be addressed to add value to your organization. These steps will help you establish a privacy program that can be […]

4 Steps to Executing a Cyber Incident Response Plan

The initial stages of incident response are frequently the most important. Incidents always involve elements of the unknown and unexpected. If this weren’t the case, then the events causing the incident should be prevented outright. This inevitable, initial lack of full understanding of the incident can cause panic and disorganization, which reduces the effectiveness of

An Introduction to the NIST Cybersecurity Framework

What is the NIST Cybersecurity Framework? The Cybersecurity Enhancement Act of 2014 amended the role of the National Institute of Standards and Technology (NIST) to include the identification and development of cybersecurity risk frameworks. Through this act, NIST was tasked with identifying a “prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and

First Steps when Executing a Cyber Incident Response Plan

The initial stages of incident response are frequently the most important. Incidents always involve elements of the unknown and unexpected. If this weren’t the case, then the events causing the incident should be prevented outright. This inevitable, initial lack of full understanding of the incident can cause panic and disorganization, which reduces the effectiveness of

5 Steps to Protect Your Company from Cyber Threats

When it comes to protecting your business from cyber threats, employ a people-centric security approach. This ensures that the first line of defense, your device end-users, are empowered to detect and prevent threats rather than increase risk due to employee negligence. It is also important to set up firewalls, utilize VPNs, and encrypt sensitive information

GDPR Quick Guide

We understand that your organization is accountable for GDPR compliance. Our holistic and structured methods will ensure an effective and efficient compliance journey. Download Infosheet

$200+ Million Credit Union

Network Security, Effective Spam Filtering & Bandwidth Optimization Background:  ATS has been the credit union’s long-term IT partner who assists with IT strategy planning, implementation, and operations. The credit union is currently operating with over $200 million in assets and about 5,000 members. Challenges: Operating in the financial industry with stringent regulations and compliance requirements,

Scroll to Top
Skip to content