Skip to main content

Blog

{Cyber Byte Video} Building a Culture of Cybersecurity

Friday, December 1, 2017

{Cyber Byte Video} Building a Culture of Cybersecurity

It's time to shift our thinking when it comes to security awareness training. Yearly education and testing just doesn't cut it in today's cyber world. Security awareness is a topic we should have in front of our people on a much more consistent basis. So, what does good security awarenes...

Read More...

Categories: Blog, Videos

Hail A Different Ride – Uber Breached in 2016

Wednesday, November 29, 2017

Hail A Different Ride – Uber Breached in 2016

Stop Us If You’ve Heard This Before... Last week, Uber – the embattled ridesharing company - made public details regarding the compromise of personal user data dating back to October 2016. Information potentially leaked in the breach includes the email addresses, phone numbers, and na...

Read More...

Categories: Blog, In the News

Three Considerations for Upgrading Your Business Continuity Plan

Wednesday, November 22, 2017

Three Considerations for Upgrading Your Business Continuity Plan

As we approach the end of 2017, it’s always a good time to look back on the lessons we learned and look ahead at improving our Information Security Plan, especially our Emergency Preparedness plans. Here are three quick and easy wins that can take any Business Continuity Plan to the next level.

Read More...

Categories: Blog

{Article} What Does a Good BIA Look Like?

Wednesday, November 22, 2017

{Article} What Does a Good BIA Look Like?

When creating a BIA, there are going to be three (3) main components that you should address to get the best results, including 1) Impacts, 2) Timeframes, and 3) Dependencies. This article will cover each of these BIA components, along with a little information on your business processes themselves.

Read More...

Categories: Blog

Testing Software Patches is Critical

Monday, October 30, 2017

Testing Software Patches is Critical

There are numerous, important components of a strong Patch Management Program; including identifying the right patches, establishing a formal schedule, deploying, and making sure your patching is effective. However, one often-overlooked, yet critical component is Patch Testing.

Read More...

Categories: Blog

Holding Your Employees Accountable

Friday, October 27, 2017

Holding Your Employees Accountable

If you believe that People are your greatest security weakness then you, likely, test employees on a regular basis to spot phishing emails, follow proper protocols when “vendors” show up at the door unexpectedly, or keep confidential information safe. What steps are taken after an employee fails?

Read More...

Categories: Blog

Cybersecurity Awareness Month, Have You Acted?

Tuesday, October 24, 2017

Cybersecurity Awareness Month, Have You Acted?

Many consumers hear the information and may even believe that cybercrime is on the rise, but many individuals simply don’t understand what they should do or if they should do anything. How can your organization help raise awareness of cybersecurity issues with the customers you serve?

Read More...

Categories: Blog
Page 10 of 16First   Previous   5  6  7  8  9  [10]  11  12  13  14  Next   Last