Between a CrowdStrike software glitch that recently brought many global industries to a temporary standstill and security breaches at major enterprises such as UnitedHealth and Ticketmaster, the digitized systems of our world and the mechanisms designed to protect them have been brought unavoidably to the fore. But if you are a small business owner or an ordinary individual without...Read More
Why Monitor Your External Resources In today’s digital age where businesses are heavily reliant on internet access to support online platforms, cybersecurity has become more critical than ever. With the constant evolution of cyber threats, organizations must adopt proactive measures to safeguard their digital assets and sensitive information. One such measure that is worthy of...Read More
Separation of duties is a critical factor for effectively managing business risk. Executives understand the importance of financial oversight and hire CPA firms to double check the work of their CFO. The same rules apply to managed IT service providers and cyber security oversight. There is a troubling trend among IT service providers as they...Read More
The age-old question: how much is enough? Executives at companies large and small ponder this question every day as news of the latest cyber-attack fills network and social media resources. So how does a company ultimately decide how much to spend on protecting itself from cyber-attacks? When it comes to cybersecurity there is no simple...Read More
It’s an unfortunate reality that cyber-crime continues to evolve. No company is immune from attack and it’s not a question of if, it’s a question of when an attack will occur. Small companies often believe they are not on the “attack radar” as there is a perception that their data has less potential value...Read More
Recent world events in Ukraine have once again focused the business on the potential impact of cyber-attacks as a means of disrupting business. This trend is particularly troubling for the automotive supply chain because the symbiotic nature of these relationships means one attack could ultimately interrupt product shipments for many companies. Looking across the supply...Read More
It’s an age-old question what came first, the chicken or the egg? This paradigm illustrates the challenge organizations face when contemplating a risk assessment. Should they fix known issues before an assessment…or should they complete the assessment and follow the prescribed recommendations. It’s an interesting question. One that can be overshadowed by the internal team’s...Read More
For any organization purchasing cyber insurance, understanding the variables that impact price and coverage is a wise investment of time. Since the Covid outbreak began, insurance rates have escalated upwards of 400%, even for companies with no prior claims. Beyond cost increases, the application process is more complex, the percentage of accepted applications has...Read More
On March 21, 2022 the President of the United States issued a statement directly addressing concerns about domestic cybersecurity. With the Ukraine war now entering the fourth week, there is heightened anxiety about the escalating cyberattacks originating in Russia. Beyond the physical attacks against the Ukraine nation, Russia has stepped up cyberattacks on countries that...Read More
The world is aghast watching Russia invade Ukraine, and it’s critical that the physical separation of these events doesn’t create a false sense of security for the US. As the countries around the globe step up sanctions and impose restrictions on critical Russian resources, war will expand on a different front. Cyberwarfare is nothing new,...Read More