Managing Security Threats from Within

Cybersecurity Threats

4 Tips for Managing Cybersecurity Threats from Within Most companies usually develop and implement cybersecurity strategies aimed at external threats. However, according to the Ponemon Institute’s and IBM Security’s “2019 Cost of a Data Breach Report,” cyberattacks from the outside only account for half of data breaches; the other half stems from internal factors, including…

Read More

Third-Party Versus First-Party Cyber Insurance Loss

Third-Party Versus First-Party Cyber Insurance Loss

With the world’s economy and governments disrupted, cybercriminals have reportedly stepped up their efforts to take advantage of the situation. Whether they come from rogue nations, terrorist groups or criminal organizations, cyber-attacks continually evolve in sophistication. They also steadily strive to broaden their field of action. No matter how small or remote your organization, you…

Read More

Did your Pandemic Plan Perform?

Did your Pandemic Plan Perform

Worldwide health crises like the COVID-19 global pandemic, SARS in 2003 and the avian flu of 2008 are bleak reminders of how governments, social institutions and economies can succumb to biological forces beyond human control. The breakdown in the socio-political and economic fabric of affected nations — both developed and developing — reveal how lack…

Read More

Cyber Insurance Policies Should Be Customized

Cyber Insurance Policies

Cyber Insurance Policies Should Be Customized | Ransomware Insurance Why You Need a Cyber Insurance Policy Tailored to Your Business With the slew of cyberattacks and data breaches escalating in terms of cost and scale of damage through the years, cyber insurance has come to the forefront of discussions. While still a relative newcomer to…

Read More

COVID-19 and The State of the Dark Web (and Your Data) 2020

covid-19 dark web

It’s no secret that large corporations and SMBs alike are struggling in the wake of the COVID-19 pandemic as social distancing measures slow global economic activity. Unfortunately, bad actors are not taking time off. In fact, the rapid shift to telework has only made company data more vulnerable, increasing the importance of comprehensive security. When times are tough, no company can afford…

Read More

Why Executive Buy-in Is Critical for a Successful Data Security Program

Critical Data Security Program

But First, Why Data Security Needs To Be a Company Priority… Cybersecurity threats and data breaches have haunted establishments the world over since vulnerabilities accessible via the internet were revealed. Earlier tinkering with yet-to-be-discovered computer capabilities led Bob Thomas to invent the Creeper (on the ARPANET), to which Ray Tomlinson (the man who invented email)…

Read More

The Value of Simulated Phishing Attacks to Organizations

what is phishing

What is Phishing? On January 2, 1996, the “AOHell” cyber threat struck America Online (AOL), at that time the No.1 internet provider in the country. AOHell was the name of one of the thousands of programs created by hackers to be used for stealing passwords and credit card information by using AOL’s instant messenger and email…

Read More

States with Consumer Data Privacy Laws

Consumer Privacy Act

NEVADA’S ACT RELATING TO INTERNET PRIVACY Senate Bill 220, or “An Act relating to Internet privacy,” will require organizations who run websites that collect and maintain data to comply months ahead of 2020, by October 1, 2019 THE CALIFORNIA CONSUMER PRIVACY ACT (CCPA) A state statute intended to enhance privacy rights and consumer protection for…

Read More

Cybersecurity Auditing – Work with the RIGHT Auditor

Cybersecurity Auditing

Why a Focus on Cybersecurity is Critical? Cybersecurity Auditing, data breaches, and other digital era dangers show up in headlines every day.  The even more sobering reality is that most of these events never become public knowledge.  In other words, we only hear about a small percentage of the incidents. Just within the past few…

Read More