Papers

Field Guide to Ransomware E-Book

Field Guide to Ransomware – E-Book

Non-stop ransomware headlines prove that these attacks are everybody’s problem. This e-book will explain what organizations of every size need to know about preventing an attack—and limiting the damage if it happens to you.

Download E-Book


What to Expect with SOC 2®

What to Expect with SOC 2®

Pratum has years of experience assisting companies with their SOC 2® process, and this document provides an overview of what we’ve learned about helping companies get a favorable report on the first try.

Download Paper


10 Most Common Information Security Risks

10 Most Common Information Security Risks

We asked our consulting team to list the 10 most common risks they see among their clients and put them together in this paper. These areas represent the places our consultants typically tell clients to focus when they want to make the biggest difference in their security posture in the shortest period of time. These are the high-ROI jobs that should move to the front of your IT team’s to-do list.

Download Paper


Employee Security Training Planner

Employee Security Training Planner

This planner will help your organization to develop an effective security awareness and training program.

Download Planner


Trends in Electronic Evidence

Trends in Electronic Evidence

In this paper, a U.S. Chief Magistrate Judge explains what she's looking for from attorneys and offers tips on how both sides in a case can winnow their work down to the ESI (electronically stored information) that really matters.

Download Paper


Information Security Risk Assessments

Best Practices for Information Security Risk Assessments

This paper provides everything you need to know about this essential review from planning to execution to follow-up.

Get the Guide Now


Digital Forensics Use Cases

Digital Forensics Use Cases

Use this guide to understand how a digital forensics investigator can support your work in a variety of legal scenarios.

Get Use Cases Now


An IT Director's Guide to Communicating Security Needs with the Executive Team

An IT Director's Guide to Communicating Security Needs to the Executive Team

This paper discusses effective ways to communicate security concerns and solutions to the executive team – providing talking points and suggestions.

Get the Guide Now


An IT Manager's Guide to a Successful Audit

An IT Manager's Guide to a Successful Audit

This paper provides an overview of the audit process and how IT management can insert themselves into this process to benefit from the exercise.

Get the Guide Now


Four Essentials for Every Cybersecurity Plan

Four Essentials for Every Cybersecurity Plan

Follow these recommendations for password policies, network management, data security, and social engineering to help lay the groundwork for policies that protect your systems, your data and your organization's future.

Get the Paper Now


Paper: First Steps in Compliance Initiatives - Risk Assessments and Policies

First Steps in Compliance Initiatives | Risk Assessments and Policies

Whether you're meeting requirements from the government or a key customer, it's not a technology topic. It's a business topic. This paper includes six key ideas to follow when writing or reviewing your policies, procedures and documentation.

Download Document

The information we track while users are on our websites helps us analyze site traffic, optimize site performance, improve our services, and identify new products and services of interest to our users. To learn more please see our Privacy Policy.