Security Assessments and Services
Managing Security Threats from Within
4 Tips for Managing Cybersecurity Threats from Within Most companies usually develop and implement cybersecurity strategies aimed at external threats. However, according to the Ponemon Institute’s and IBM Security’s “2019 Cost of a Data Breach Report,” cyberattacks from the outside only account for half of data breaches; the other half stems from internal factors, including…
Read MorePrioritize Cybersecurity & Compliance When Business Operations Are Forced to Rapidly Shift
The COVID-19 outbreak has forced many organizations to encourage or instruct their employees to work remotely. Besides the need for social distancing at the moment, remote working is still prevalent in the modern, flexible workplace. A recent survey confirmed that globally, 50 percent of employees work outside their main offices for at least two to…
Read MoreThird-Party Versus First-Party Cyber Insurance Loss
With the world’s economy and governments disrupted, cybercriminals have reportedly stepped up their efforts to take advantage of the situation. Whether they come from rogue nations, terrorist groups or criminal organizations, cyber-attacks continually evolve in sophistication. They also steadily strive to broaden their field of action. No matter how small or remote your organization, you…
Read MoreDid your Pandemic Plan Perform?
Worldwide health crises like the COVID-19 global pandemic, SARS in 2003 and the avian flu of 2008 are bleak reminders of how governments, social institutions and economies can succumb to biological forces beyond human control. The breakdown in the socio-political and economic fabric of affected nations — both developed and developing — reveal how lack…
Read MoreCyber Insurance Policies Should Be Customized
Cyber Insurance Policies Should Be Customized | Ransomware Insurance Why You Need a Cyber Insurance Policy Tailored to Your Business With the slew of cyberattacks and data breaches escalating in terms of cost and scale of damage through the years, cyber insurance has come to the forefront of discussions. While still a relative newcomer to…
Read MoreCOVID-19 and The State of the Dark Web (and Your Data) 2020
It’s no secret that large corporations and SMBs alike are struggling in the wake of the COVID-19 pandemic as social distancing measures slow global economic activity. Unfortunately, bad actors are not taking time off. In fact, the rapid shift to telework has only made company data more vulnerable, increasing the importance of comprehensive security. When times are tough, no company can afford…
Read MoreWhy Executive Buy-in Is Critical for a Successful Data Security Program
But First, Why Data Security Needs To Be a Company Priority… Cybersecurity threats and data breaches have haunted establishments the world over since vulnerabilities accessible via the internet were revealed. Earlier tinkering with yet-to-be-discovered computer capabilities led Bob Thomas to invent the Creeper (on the ARPANET), to which Ray Tomlinson (the man who invented email)…
Read MoreThe Value of Simulated Phishing Attacks to Organizations
What is Phishing? On January 2, 1996, the “AOHell” cyber threat struck America Online (AOL), at that time the No.1 internet provider in the country. AOHell was the name of one of the thousands of programs created by hackers to be used for stealing passwords and credit card information by using AOL’s instant messenger and email…
Read MoreStates with Consumer Data Privacy Laws
NEVADA’S ACT RELATING TO INTERNET PRIVACY Senate Bill 220, or “An Act relating to Internet privacy,” will require organizations who run websites that collect and maintain data to comply months ahead of 2020, by October 1, 2019 THE CALIFORNIA CONSUMER PRIVACY ACT (CCPA) A state statute intended to enhance privacy rights and consumer protection for…
Read MoreCybersecurity Auditing – Work with the RIGHT Auditor
Why a Focus on Cybersecurity is Critical? Cybersecurity Auditing, data breaches, and other digital era dangers show up in headlines every day. The even more sobering reality is that most of these events never become public knowledge. In other words, we only hear about a small percentage of the incidents. Just within the past few…
Read More