Every workplace has made changes during the COVID-19 pandemic. With employees struggling to balance changing business dynamics, many companies are pushing cybersecurity concerns down on the list of priorities. Deprioritizing cybersecurity is a mistake. The migration to work from home environments introduces new variables that increase exposure to malware attacks, phishing, and other cybercrime. In...Read More
Over the last decade, the number of devices in homes has increased drastically. According to Deloitte, the average U.S. home now has 11 internet-connected devices. Due to COVID-19 and the increase of remote work and school, that number has likely increased in the last few months. As we bring more devices into our homes, it’s...Read More
As COVID-19 impacted operations for many businesses across the world, a work from home environment has quickly become a new normal for many employees. In WFH scenarios, company and client data is exchanged between desktop devices and servers that reside in corporate facilities or the cloud. How that data is managed in transit and at...Read More
It can feel overwhelming to know where to start when it comes to protecting your staff from security threats. That’s why we created this infographic to explain three steps that you can take right now to keep your employees safe from exploitation. Following these steps will help to create a questioning culture where your employees...Read More
Everyone Using These Tools Should Consider How Secure They Are With the rapid transition to work from home environments…it’s no wonder that the use of web meeting technologies has grown exponentially. Everyone using these tools should consider how secure they are as revelations about Zoom have highlighted potential risks. With an easy to use interface and...Read More
Protecting Important Data in a Work from Home (WFH) World In true American spirit, companies nationwide have quickly adapted to the rapid spread of COVID-19 and transitioned employees to a work from home (WFH) model. This approach is critical to limiting the impact of the virus, and for many organizations, it is a viable workaround....Read More
A health care provider has closed unexpectedly due to a ransomware attack. ENT & Hearing Services in Battle Creek, Michigan, is the first health provider in the nation to close due to cybersecurity flaws. Since HIPAA is based on NIST 800-53, father to NIST 800-171, ENT & Hearing Services demonstrates the importance of maintaining diligence...Read More
Should you be in compliance with NIST SP 800-171 but decided to put this process on hold? Now is a good time to start since the DoD recently announced that within the next 18 months, they will start auditing companies’ cybersecurity procedures that want to win contracts. Access the full article here – https://federalnewsnetwork.com/defense/2019/03/dod-to-start-crackdown-on-contractors-not-complying-with-cybersecurity-standards-will-also-add-more-compliance-rules/ ...Read More
News, that was revealed this year of a defense contractor losing sensitive data to China, has heightened the focus on NIST 800-171compliance. Protecting military data is a top priority for the DoD, and China is just one of many entities focused on nefariously obtaining this this information. Without critical defenses in place to safeguard data...Read More
Cybersecurity Compliance by Department of Defense Contractors By Michael S. Khoury Originally published in the Michigan Business Law Journal (Vol. 38, Issue 2, Summer 2018, pp. 10-11). Archive located HERE.Read More