Managed Security Service Provider (MSSP)

Managed Security Service Provider (MSSP) What is a Managed Security Service Provider (MSSP)? A managed security service provider (MSSP) provides outsourced monitoring and management...

VoIP Security

VoIP Security Voice over Internet Protocol (VoIP) is a service that digitizes audio and then transmits it over an Internet connection, rather than through a landline connection....

IT Security Compliance

Cyber Security Compliance Cyber Security Compliance is a critical component of any information security program. Compliance lives by the rule that states we “Trust but Verify”....

General Data Protection Regulation

General Data Protection Regulation (GDPR) What is GDPR? The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing...

PCI

Payment Card Industry Data Security Standard (PCI DSS) What is PCI DSS compliance? The Payment Card Industry Data Security Standard (PCI DSS) refers to payment security standards...

HIPAA

Health Insurance Portability and Accountability Act (HIPAA) What is the Health Insurance Portability and Accountability Act (HIPAA)? HIPAA (Health Insurance Portability and Accountability...

Gramm-Leach-Bliley Act

Gramm-Leach-Bliley Act What is the Gramm-Leach-Bliley Act? The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United...

GAPP

Generally Accepted Privacy Principles (GAPP) What is GAPP? Generally Accepted Privacy Principles (GAPP) is a framework intended to assist Chartered Accountants and Certified Public...

International Organization for Standardization

International Organization for Standardization (ISO) What is ISO? ISO is stand for International Organization for Standardization. It is an international standard-setting body composed...

FedRAMP

Federal Risk and Authorization Management Program (FedRAMP) What is Federal Risk and Authorization Management Program (Fed RAMP)? The Federal Risk and Authorization Management Program...

Sarbanes-Oxley (SOX)

Sarbanes-Oxley (SOX) What is SOX? SOX is a United States federal law that set new or expanded requirements for all U.S. public company boards, management and public accounting firms. SOX...

IT Security Program

Information Security Program What is Information Security Program? Information Security Program is a documented set of your company's information security policies, procedures,...

Cyber Security Framework

Cyber Security Framework What is Cybersecurity Frameworks? Cyber Security Frameworks is a series of documented, agreed, and understood policies, procedures, and processes that define...

DRP

Disaster Recovery Plan (DRP) What is Disaster Recovery Plan (DRP)? Disaster Recovery Plan (DRP) is a documented, structured approach with instructions for responding to unplanned...

IT Security Policies

IT Security Policies Regardless of size and industry, every organization needs to have documented IT Security and Privacy Policies in place to help protect the organization's data...

IT Security Training

Cyber Security Awareness Training Do you know? In the Cyber Threat Landscape, 60% of ALL companies who are hit with even a modest cyberattack fail within just six months. 60% said...

IT Security Audit

Information Security Audit Do you know? Today the cybersecurity market is valued at $120 billion. The average cost of a data breach in 2020 will exceed $150 million. By 2021, Cybersecurity...

About Us

About Us Secured Transactions is the Cybersecurity division of MJJT Consultantsalong with Ultratek Computers & Communication, Top Web Designer, and Tri-State Web Marketing. Secured...

Jenny Jo CISM and President

Meet Our President Jenny Jo, CISM President Golden Member at ISACA This email address is being protected from spambots. You need JavaScript enabled to view it. document.getElementById('cloak520f609f567599caf8460d6b959d6884').innerHTML...

IoT Security

Internet of Thing (IoT) Microsoft recently issued a warning that a foreign country was using the Internet of Things (IoT) devices as launching pads. Such as IoT printers, video...