Managed Security Service Provider (MSSP)
What is a Managed Security Service Provider (MSSP)?
A managed security service provider (MSSP) provides outsourced monitoring and management...
VoIP Security
Voice over Internet Protocol (VoIP) is a service that digitizes audio and then transmits it over an Internet connection, rather than through a landline connection....
Cyber Security Compliance
Cyber Security Compliance is a critical component of any information security program. Compliance lives by the rule that states we “Trust but Verify”....
General Data Protection Regulation (GDPR)
What is GDPR?
The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing...
Payment Card Industry Data Security Standard (PCI DSS)
What is PCI DSS compliance?
The Payment Card Industry Data Security Standard (PCI DSS) refers to payment security standards...
Health Insurance Portability and Accountability Act (HIPAA)
What is the Health Insurance Portability and Accountability Act (HIPAA)?
HIPAA (Health Insurance Portability and Accountability...
Gramm-Leach-Bliley Act
What is the Gramm-Leach-Bliley Act?
The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United...
Generally Accepted Privacy Principles (GAPP)
What is GAPP?
Generally Accepted Privacy Principles (GAPP) is a framework intended to assist Chartered Accountants and Certified Public...
International Organization for Standardization (ISO)
What is ISO?
ISO is stand for International Organization for Standardization. It is an international standard-setting body composed...
Federal Risk and Authorization Management Program (FedRAMP)
What is Federal Risk and Authorization Management Program (Fed RAMP)?
The Federal Risk and Authorization Management Program...
Sarbanes-Oxley (SOX)
What is SOX?
SOX is a United States federal law that set new or expanded requirements for all U.S. public company boards, management and public accounting firms.
SOX...
Written Information Security Program (WISP)
What is Written Information Security Program (WISP)?
Written Information Security Program (WISP) is a written plan or program that outlines...
Cyber Security Framework
What is Cybersecurity Frameworks?
Cyber Security Frameworks is a series of documented, agreed, and understood policies, procedures, and processes that define...
Disaster Recovery Plan (DRP)
What is Disaster Recovery Plan (DRP)?
Disaster Recovery Plan (DRP) is a documented, structured approach with instructions for responding to unplanned...
IT Security Policies
Regardless of size and industry, every organization needs to have documented IT Security and Privacy Policies in place to help protect the organization's data...
Cyber Security Awareness Training
Do you know? In the Cyber Threat Landscape, 60% of ALL companies who are hit with even a modest cyberattack fail within just six months. 60% said...
Information Security Audit
Do you know? Today the cybersecurity market is valued at $120 billion. The average cost of a data breach in 2020 will exceed $150 million. By 2021, Cybersecurity...
About Us
Secured Transactions is the Cybersecurity division of MJJT Consultantsalong with Ultratek Computers & Communication, Top Web Designer, and Tri-State Web Marketing.
Secured...
Internet of Thing (IoT)
Microsoft recently issued a warning that a foreign country was using the Internet of Things (IoT) devices as launching pads. Such as IoT printers, video...
Artificial Intelligence (AI)
What is Artificial Intelligence (AI)?
Artificial Intelligence (AI) is the simulation of human intelligence processes by machines.
What does AI mean?
AI...