Between a CrowdStrike software glitch that recently brought many global industries to a temporary standstill and security breaches at major enterprises such as UnitedHealth and Ticketmaster, the digitized systems of our world and the mechanisms designed to protect them have been brought unavoidably to the fore. But if you are a small business owner or an ordinary individual without...Read More
Why Monitor Your External Resources In today’s digital age where businesses are heavily reliant on internet access to support online platforms, cybersecurity has become more critical than ever. With the constant evolution of cyber threats, organizations must adopt proactive measures to safeguard their digital assets and sensitive information. One such measure that is worthy of...Read More
In the ever-evolving manufacturing space, operational technology (OT) is critical to optimizing production processes and driving efficiency. As industries embrace digital transformation, the security of OT systems has become a key concern. With the growing threat of cyberattacks, manufacturers are forced to prioritize security measures that protect their valuable assets, ensure uninterrupted operations, and...Read More
Separation of duties is a critical factor for effectively managing business risk. Executives understand the importance of financial oversight and hire CPA firms to double check the work of their CFO. The same rules apply to managed IT service providers and cyber security oversight. There is a troubling trend among IT service providers as they...Read More
The age-old question: how much is enough? Executives at companies large and small ponder this question every day as news of the latest cyber-attack fills network and social media resources. So how does a company ultimately decide how much to spend on protecting itself from cyber-attacks? When it comes to cybersecurity there is no simple...Read More
It’s an unfortunate reality that cyber-crime continues to evolve. No company is immune from attack and it’s not a question of if, it’s a question of when an attack will occur. Small companies often believe they are not on the “attack radar” as there is a perception that their data has less potential value...Read More
Anyone with cybersecurity experience is a hot commodity in the current job market. For those seeking talent, the transition of the workforce from in-office to work-from-home due of COVID has made the competition fiercer. Gone are the traditional geographic boundaries and regional salary limitations. It’s now commonplace for employees who live in the Midwest to...Read More
Ransomware and other types of cyber incidents are now commonplace discussion topics in boardrooms for companies large and small. Fear of exposure, disruption, and financial loss are leading contributors to the conversation. In fact, nearly three quarters of US CEOs in Price Waterhouse Coopers 24th Annual Global CEO Survey said they are “extremely concerned” about...Read More
Recent world events in Ukraine have once again focused the business on the potential impact of cyber-attacks as a means of disrupting business. This trend is particularly troubling for the automotive supply chain because the symbiotic nature of these relationships means one attack could ultimately interrupt product shipments for many companies. Looking across the supply...Read More
It’s an age-old question what came first, the chicken or the egg? This paradigm illustrates the challenge organizations face when contemplating a risk assessment. Should they fix known issues before an assessment…or should they complete the assessment and follow the prescribed recommendations. It’s an interesting question. One that can be overshadowed by the internal team’s...Read More