Category

Cloud Computing
In 1996, a Microsoft employee used the first Virtual Private Network (VPN) to provide a secure connection to the Internet — which later was adapted into a popular method for remotely connecting with private corporate networks by the 2000s. Obviously, a lot has changed since then in terms of IT environments and infrastructure — that...
Read More
Protecting Backup Solutions From Threats and Vulnerabilities  As we have recently hit the end of the financial tax season and concluded some of the busy periods companies endure for selling their product or service, this is the time of year when many organizations reevaluate their business continuity and disaster recovery plans. While they likely consider...
Read More
Best Practices for Managing Organizational Data Breach Privacy At conferences, networking events, trade shows, or even just at social gatherings, the topic may have come up that put you in a position where someone was telling you about a data breach or other cyber incident their business incurred. While the conversation may have been genuine...
Read More
As we remain vulnerable to the constantly-evolving financial frauds and cybersecurity threat landscape and in light of recent events such as the QuickBooks payment scams, it’s important to be vigilant against any type of deception used to financially despair a person or organization — otherwise known as fraud.  Fraud takes many forms depending on the...
Read More
11 best practices for managing organizational proactive cybersecurity threats during these high-intensity times As global conflicts have been unfolding overseas, organizations in the United States need to be on high alert for the cybersecurity threats that have been recently surging. It’s important to take a proactive approach by preparing as if your network systems, devices,...
Read More
Philosophically, the term “holistic” describes the interconnectedness of parts that represent a whole. The medical community refers to treating someone in their entirety using ALL factors, not just managing one particular symptom. These conceptual descriptions of the word also parallel how a holistic approach is used in cybersecurity.  Holistic cybersecurity utilizes ALL types of solutions...
Read More
Although it may seem counterintuitive, many organizations will find themselves in awkward positions where they invested time and money into a new software platform, Cloud Security solution, or automation tool only to not fully adopt it (or even use it at all). For instance, something as time-saving to employees as customer relationship management (CRM) software...
Read More
Endpoint detection & response (EDR) is a cybersecurity solution consisting of multiple tools (including AI) that monitor for potential security threats and address them head on. This technology works by constantly collecting information from endpoint devices connected to an organization’s network such as desktops, servers, laptops, or tablets. By “information,” we are mostly referring to...
Read More
Here we go over the steps and preplanning that need to be taken after a cybersecurity incident to recover your business back to operation and restore public trust.    Moving into the final stage of the NIST cybersecurity framework, we now enter the “Recover” function. The activities involved in this function would take place after an...
Read More
This NIST framework function will tell you everything you need to do to respond to a cybersecurity incident including the strategic planning and specific areas to focus on.  Continuing through the primary functions of the NIST cybersecurity framework, we get to “Respond.” After the “Identify” function where you had determined the risks, vulnerabilities, and elements...
Read More
1 2 3 6