Category

education and training
Are You Asking the Right Questions to Your Security Partners?  The recent Okta security breach is another example of companies founded on the vision of providing cybersecurity solutions, not necessarily being immune to attacks. It also shows the devastation that a cyber incident can have when targeted toward a cybersecurity software vendor, consultant, or managed...
Read More
Identity Theft Security Identity theft (or fraud) is a concept that has been tossed around for decades with the term first coined and used in 1964. Over the last few years, however, cases of identity theft have really accelerated throughout the advanced development of financial technology — particularly mobile banking/credit card management and increased capabilities...
Read More
11 best practices for managing organizational proactive cybersecurity threats during these high-intensity times As global conflicts have been unfolding overseas, organizations in the United States need to be on high alert for the cybersecurity threats that have been recently surging. It’s important to take a proactive approach by preparing as if your network systems, devices,...
Read More
Philosophically, the term “holistic” describes the interconnectedness of parts that represent a whole. The medical community refers to treating someone in their entirety using ALL factors, not just managing one particular symptom. These conceptual descriptions of the word also parallel how a holistic approach is used in cybersecurity.  Holistic cybersecurity utilizes ALL types of solutions...
Read More
Although it may seem counterintuitive, many organizations will find themselves in awkward positions where they invested time and money into a new software platform, Cloud Security solution, or automation tool only to not fully adopt it (or even use it at all). For instance, something as time-saving to employees as customer relationship management (CRM) software...
Read More
Cyber insurance has increasingly become one of the most valuable insurance coverages sought out by organizations of all shapes and sizes. As cyber-related threats continue to evolve and multiply, the insurance offers a financial umbrella for those who fall victim to attempted and successful breaches.  Cyber insurance consists of two major components; first-party and third-party...
Read More
Endpoint detection & response (EDR) is a cybersecurity solution consisting of multiple tools (including AI) that monitor for potential security threats and address them head on. This technology works by constantly collecting information from endpoint devices connected to an organization’s network such as desktops, servers, laptops, or tablets. By “information,” we are mostly referring to...
Read More
Here we go over the steps and preplanning that need to be taken after a cybersecurity incident to recover your business back to operation and restore public trust.    Moving into the final stage of the NIST cybersecurity framework, we now enter the “Recover” function. The activities involved in this function would take place after an...
Read More
Following these consumer security best practices for online shopping will help you get through the holiday season securely as well as avoid shopping scams, prevent theft of your personal data, and secure your credit card information.   Kate, a mother of three, couldn’t contain her excitement for shopping during the holiday season when she received an...
Read More
As we continue our journey with NIST, Here we show you what it means to “protect” while providing our readers with industry best practices towards your security program. A cybersecurity program’s “Protect” function is often the most thought-about area that organizations consider when looking to enhance their security program. It’s also the second of five...
Read More
1 2 3 4 6