Category

security posture
Cyber & data breach insurance has increasingly become one of the most valuable insurance coverages sought out by organizations of all shapes and sizes. As cyber-related threats continue to evolve and multiply, the insurance offers a financial umbrella for those who fall victim to attempted and successful breaches.  Cyber insurance consists of two major components;...
Read More
Keep this in mind as we start the 2022 Windows software patching year: Patching is not enough to keep Microsoft 365 protected. Before you purchase third-party tools that claim to protect you from all threats, or before you begin that zero-trust project, stop for a moment to evaluate whether you are doing all you can...
Read More
Here we go over the steps and preplanning that need to be taken after a cybersecurity incident to get your business back to operational and restore public trust.    Moving into the final stage of the NIST cybersecurity framework, we now enter the “Recover” function. The activities involved in this function would take place after an...
Read More
Following these consumer best practices for online shopping will help you get through the holiday season securely as well as avoid shopping scams, prevent theft of your personal data, and secure your credit card information.   Kate, a mother of three, couldn’t contain her excitement for shopping during the holiday season when she received an email...
Read More
The NIST Security Framework is the ultimate roadmap for which the United States government outlines how businesses can develop their cybersecurity program to account for the threat landscape that is forever evolving. The framework is long and detailed but can be more easily understood when the recommended best practices and security measures are broken down...
Read More
Thinking of adopting Zero Trust. Here are some fundamental principles you need to know. What is the Zero Trust Security Officially named in 2010, a network security model was introduced to secure organizations’ evolving IT infrastructure, which became more vulnerable after heavily incorporating cloud-based applications and databases into their current IT management strategy, creating a...
Read More
If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy. By Neal Weinberg Interest in zero trust is surging, according to IDG’s 2020 Security Priorities Study, with 40% of survey respondents saying they are actively researching zero trust technologies, up from only 11% in 2019, and 18% of organizations...
Read More
By Christopher Burgess Attackers essentially broke into the Twitch house and cleaned out everything. Following least-privilege access principles and encrypted datasets will help others avoid that scenario. No company wants to see its crown jewels exposed to the elements, yet this is what happened to the Amazon-owned online streaming platform Twitch on October 6 when 125GB...
Read More
Existing and new challenges, from supply chain hacks to 5G rollouts, will continue to test the expanded role of security teams. CISOs faced a number of challenges in 2020, not the least of which was COVID-19 and the mass migration from onsite to remote work. Maybe for the first time, corporate leadership saw just how...
Read More
It’s finally 2021 and towards the end of 2020 the world experienced one of the largest cyber breaches in history.  A commonly used security software company by the name of Solarwinds was breached. This caused thousands of businesses globally to be affected with potential malware, mimicking our own global cyber pandemic. Trust in security tools...
Read More
1 2