Kristina Oleinichenko

Posts by Kristina Oleinichenko:

What is SOC 2 and SOC 2 compliance?

What is SOC 2? 

What is the real cost of data breach? 

What is the real cost of a data breach? 

5 steps in operational security

What are the 5 steps in operational security? 

Who is targeted by ransomware

Who is targeted by ransomware? 

Use compliance monitoring as a part of your cybersecurity program

Why use compliance monitoring as a part of your cybersecurity program? 

What is a common indicator of a phishing attempt

What is a common indicator of a phishing attempt?

Ransomware prevention: Top Security Tips

Ransomware prevention: Top Security Tips

Importance of continuous control monitoring (CCM)

Importance of continuous control monitoring (CCM)

Why is cybersecurity important? Taking proactive cybersecurity measures

Why is cybersecurity important? Taking proactive cybersecurity measures.

Are you ready for the Digital Operational Resilience Act (DORA)?

X