Skip to main content

Resources

Spectre and Meltdown

Thursday, January 4, 2018

Spectre and Meltdown

On January 3rd, 2018, massive security flaws affecting nearly every computer were revealed. Known as Spectre and Meltdown, these exploits have alarming repercussions that could potentially affect and change an architecture that is deeply rooted in the lives of the technological world.

Read More...

Categories: Blog, In the News

MoneyTaker Steals Millions from the Financial Sector

Thursday, December 21, 2017

MoneyTaker Steals Millions from the Financial Sector

Once again, we find the financial sector as the target of a string of attacks making its way across the United States and Russia. The “MoneyTaker” group was reported to have conducted over 20 successful attacks in 2016 and 2017, stealing a total of over $11 Million along with sensitive information t...

Read More...

Categories: Blog

{Article} How to Build a Better IT Risk Assessment

Wednesday, December 20, 2017

{Article} How to Build a Better IT Risk Assessment

A comprehensive, measurable, and repeatable IT Risk Assessment should be used to help an organization make better decisions. Without a detailed framework, any money spent on information security is akin to throwing darts at a board.

Read More...

Categories: Blog

Hail A Different Ride – Uber Breached in 2016

Wednesday, November 29, 2017

Hail A Different Ride – Uber Breached in 2016

Stop Us If You’ve Heard This Before... Last week, Uber – the embattled ridesharing company - made public details regarding the compromise of personal user data dating back to October 2016. Information potentially leaked in the breach includes the email addresses, phone numbers, and na...

Read More...

Categories: Blog, In the News

Three Considerations for Upgrading Your Business Continuity Plan

Wednesday, November 22, 2017

Three Considerations for Upgrading Your Business Continuity Plan

As we approach the end of 2017, it’s always a good time to look back on the lessons we learned and look ahead at improving our Information Security Plan, especially our Emergency Preparedness plans. Here are three quick and easy wins that can take any Business Continuity Plan to the next level.

Read More...

Categories: Blog

{Article} What Does a Good BIA Look Like?

Wednesday, November 22, 2017

{Article} What Does a Good BIA Look Like?

When creating a BIA, there are going to be three (3) main components that you should address to get the best results, including 1) Impacts, 2) Timeframes, and 3) Dependencies. This article will cover each of these BIA components, along with a little information on your business processes themselves.

Read More...

Categories: Blog
Page 26 of 33First   Previous   21  22  23  24  25  [26]  27  28  29  30  Next   Last