Skip to main content

Resources

MoneyTaker Steals Millions from the Financial Sector

Thursday, December 21, 2017

MoneyTaker Steals Millions from the Financial Sector

Once again, we find the financial sector as the target of a string of attacks making its way across the United States and Russia. The “MoneyTaker” group was reported to have conducted over 20 successful attacks in 2016 and 2017, stealing a total of over $11 Million along with sensitive information t...

Read More...

Categories: Blog

{Article} How to Build a Better IT Risk Assessment

Wednesday, December 20, 2017

{Article} How to Build a Better IT Risk Assessment

A comprehensive, measurable, and repeatable IT Risk Assessment should be used to help an organization make better decisions. Without a detailed framework, any money spent on information security is akin to throwing darts at a board.

Read More...

Categories: Blog

{Cyber Byte Video} Building a Culture of Cybersecurity

Friday, December 1, 2017

{Cyber Byte Video} Building a Culture of Cybersecurity

It's time to shift our thinking when it comes to security awareness training. Yearly education and testing just doesn't cut it in today's cyber world. Security awareness is a topic we should have in front of our people on a much more consistent basis. So, what does good security awarenes...

Read More...

Categories: Blog, Videos

Hail A Different Ride – Uber Breached in 2016

Wednesday, November 29, 2017

Hail A Different Ride – Uber Breached in 2016

Stop Us If You’ve Heard This Before... Last week, Uber – the embattled ridesharing company - made public details regarding the compromise of personal user data dating back to October 2016. Information potentially leaked in the breach includes the email addresses, phone numbers, and na...

Read More...

Categories: Blog, In the News

Three Considerations for Upgrading Your Business Continuity Plan

Wednesday, November 22, 2017

Three Considerations for Upgrading Your Business Continuity Plan

As we approach the end of 2017, it’s always a good time to look back on the lessons we learned and look ahead at improving our Information Security Plan, especially our Emergency Preparedness plans. Here are three quick and easy wins that can take any Business Continuity Plan to the next level.

Read More...

Categories: Blog

{Article} What Does a Good BIA Look Like?

Wednesday, November 22, 2017

{Article} What Does a Good BIA Look Like?

When creating a BIA, there are going to be three (3) main components that you should address to get the best results, including 1) Impacts, 2) Timeframes, and 3) Dependencies. This article will cover each of these BIA components, along with a little information on your business processes themselves.

Read More...

Categories: Blog
Page 9 of 17First   Previous   4  5  6  7  8  [9]  10  11  12  13  Next   Last