Posts by Emory Vandiver
Ensure Cyber Risk Management Doesn’t Impede Business Performance
Cyber security has become a priority for most organizations, and rightly so. Data breaches are a real risk, and cybercriminals aren’t going away. The “prohibition” approach (or “zero trust”), which limits access to web pages and applications, is a go-to model for data protection. But are security programs interfering with business performance? Research suggests that…
Read MoreCyber Security – A Top Business Risk….and Opportunity in 2021
Cyber security remains a critical element to any organization as cyber threats continue to become increasingly sophisticated, expensive, and disruptive. As detailed below, there are many high-profile examples of cyber breaches, however it’s very important to understand that the same risk level applies to every company equally – regardless of size, industry etc. According to…
Read MoreWarning – Assessors should NOT be Assessing Themselves
A lot of businesses today rely upon cloud-based systems to operate. These include the use of cloud-based storage, online marketing systems, digital media, social media marketing, and so on. But as reports of data breaches and security threats continue to increase, clients and customers need some extra reassurance that the company they are doing business…
Read MoreKnow About the DFARS Interim Rule 11/30/20 Deadline re: CMMC Compliance?
SUMMARY: DoD is issuing an interim rule to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to implement a DoD Assessment Methodology and Cybersecurity Maturity Model Certification (CMMC) framework in order to assess contractor implementation of cybersecurity requirements and enhance the protection of unclassified information within the DoD supply chain. DATES: Effective November 30, 2020.…
Read MoreUnderstanding SOC 2 and Deciding Which Principles Are Right Your Company
If you’re a service company such as a cloud or SaaS provider, you need to pass what’s called the System Organization Controls (SOC) 2 audit. Passing the audit shows that you take cybersecurity seriously. But how do you pass? Well, you need to: Choose which of the 5 SOC 2 principles apply Instruct an assessment based on…
Read MoreEmail Phishing – Your Organization’s Biggest Cyber Threat
All it takes is a single email for hackers to gain access and steal company data. Whenever an email lands in your inbox, there’s a chance it’s a phishing scam. This is because email phishing scams are extremely common. In fact, studies suggest that phishing scams cause 90% of all company data breaches. So how do…
Read MoreBeware – Cyber Security Language in Your Third-Party Contracts
Cyber security is a constantly changing field with constantly changing requirements. Recently, companies have found increasing technical jargon inserted into their contracts with third parties (ie customers and vendors). These companies seek to ensure that they are protecting themselves from cyber threats by the way of third parties that they connect to. However, this technical…
Read MoreApplication Security Begins at Planning
Why Application Security Should Begin at Planning As cybersecurity threats become more potent and prevalent, the need to make apps more secure by identifying and fixing vulnerabilities and enhancing their security is critical. Application security has been getting more attention lately, especially after the Veracode “State of Software Security Vol. 10” report revealed that 83…
Read MorePrioritize Cybersecurity & Compliance When Business Operations Are Forced to Rapidly Shift
The COVID-19 outbreak has forced many organizations to encourage or instruct their employees to work remotely. Besides the need for social distancing at the moment, remote working is still prevalent in the modern, flexible workplace. A recent survey confirmed that globally, 50 percent of employees work outside their main offices for at least two to…
Read MoreDid your Pandemic Plan Perform?
Worldwide health crises like the COVID-19 global pandemic, SARS in 2003 and the avian flu of 2008 are bleak reminders of how governments, social institutions and economies can succumb to biological forces beyond human control. The breakdown in the socio-political and economic fabric of affected nations — both developed and developing — reveal how lack…
Read More