Category

Security
Heading into mid-to-late Summer, many organizations use this time of year to strategize or restrategize how they’ll prepare for a major crisis. A huge component of this process is planning for business continuity (BC) and disaster recovery (DR). Without a robust system of practices, technology, and strategies dedicated to carrying on with operations and retaining...
Read More
Protecting Backup Solutions From Threats and Vulnerabilities  As we have recently hit the end of the financial tax season and concluded some of the busy periods companies endure for selling their product or service, this is the time of year when many organizations reevaluate their business continuity and disaster recovery plans. While they likely consider...
Read More
Best Practices for Managing Organizational Data Breach Privacy At conferences, networking events, trade shows, or even just at social gatherings, the topic may have come up that put you in a position where someone was telling you about a data breach or other cyber incident their business incurred. While the conversation may have been genuine...
Read More
As we continue our journey on what it means to practice holistic cybersecurity and its comprehensive methodology, we can now go into the process of getting your business to that point. Everything about going holistic and fully implementing a robust security strategy such as Zero Trust starts with “Identity.” Identification is merely the process of...
Read More
What are CVEs? The world of Cybersecurity Vulnerability management is as wide is it is deep. Nefarious actors fighting to infiltrate networks will rip apart common vulnerabilities (CVEs) of the tools used to conduct business and look at every nook and cranny to see how they can get a foot in the door. Thankfully as...
Read More
Are You Asking the Right Questions to Your Security Partners?  The recent Okta security breach is another example of companies founded on the vision of providing cybersecurity solutions, not necessarily being immune to attacks. It also shows the devastation that a cyber incident can have when targeted toward a cybersecurity software vendor, consultant, or managed...
Read More
Identity Theft Security Identity theft (or fraud) is a concept that has been tossed around for decades with the term first coined and used in 1964. Over the last few years, however, cases of identity theft have really accelerated throughout the advanced development of financial technology — particularly mobile banking/credit card management and increased capabilities...
Read More
Understanding Today’s Malware HermeticWiper and PartyTicket   Cyberwarfare has become its own “battlefield” in today’s global conflicts. The ability to slow down communications between military resources, shut down entire systems, and prevent intelligence from being shared amongst departments can give even a relatively small military a leg up while impacting the physical battlefield. With all that...
Read More
11 best practices for managing organizational proactive cybersecurity threats during these high-intensity times As global conflicts have been unfolding overseas, organizations in the United States need to be on high alert for the cybersecurity threats that have been recently surging. It’s important to take a proactive approach by preparing as if your network systems, devices,...
Read More
Philosophically, the term “holistic” describes the interconnectedness of parts that represent a whole. The medical community refers to treating someone in their entirety using ALL factors, not just managing one particular symptom. These conceptual descriptions of the word also parallel how a holistic approach is used in cybersecurity.  Holistic cybersecurity utilizes ALL types of solutions...
Read More
1 2 3 11