This month’s spotlight EEF Worksheet is on Citrix Virtual Apps and Desktops 7.X. Citrix is a EUC technology company that focuses on both EUC and SD-WAN. Citrix is leveraged in a 3rd party remote worker or contractor use case in many companies today. This technology had many complaint and security capabilities to support this capability but based on the EEF gap analysis it highlights where it is susceptible to advanced phishing techniques using social engineering and programming expertise, bots, and ransomware threats without both advanced configuration and 3rd party integrations.  Are you using Citrix for remote contractors? Are you configured for the gaps? Like OS security flaws visibility, governing access and control, Virus scanning and Compliance monitoring?  Use this month's EEF for Citrix Worksheet to help build your gap analysis for your contractors and remote workers 

Review and Download

Additional Compliance and Security info

National Institute of Standards and Technology (NIST)


NIST is an organization with strong values, reflected both in our history and our current work.  NIST leadership and staff will uphold these values to ensure a high performing environment that is safe and respectful of all.

  • Perseverance: We take the long view, planning the future with scientific knowledge and imagination to ensure continued impact and relevance for our stakeholders.
  • Integrity: We are ethical, honest, independent, and provide an objective perspective.
  • Inclusivity:  We work collaboratively to harness the diversity of people and ideas, both inside and outside of NIST, to attain the best solutions to multidisciplinary challenges.  
  • Excellence: We apply rigor and critical thinking to achieve world-class results and continuous improvement in everything we do

Find out more

National Conference of State Legislatures (NCSL)

 Security breach laws typically have provisions regarding who must comply with the law (e.g., businesses, data/ information brokers, government entities, etc); definitions of “personal information” (e.g., name combined with SSN, drivers license or state ID, account numbers, etc.); what constitutes a breach (e.g., unauthorized acquisition of data); requirements for notice (e.g., timing or method of notice, who must be notified); and exemptions (e.g., for encrypted information)   All 50 US states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or governmental entities to notify individuals of security breaches of information involving personally identifiable information. 

US Breach Compliance Requirements