The world is aghast watching Russia invade Ukraine, and it’s critical that the physical separation of these events doesn’t create a false sense of security for the US. As the countries around the globe step up sanctions and impose restrictions on critical Russian resources, war will expand on a different front. Cyberwarfare is nothing new,...Read More
It’s no secret that the world gets smaller every year. Globalization of industry and trade has created ever-expanding opportunities, sometimes to the detriment of businesses and individuals. The internet is a critical variable in this equation as it delivers instant access to resources worldwide and produces a growing industry focused on cyber-crime. There is a...Read More
A risk management framework (RMF) is an organization’s security controls road map for managing its cyber risks. RMFs define how the people in an organization utilize processes to manage technology, ensure oversight, and reduce risk exposure. The framework often serves multiple purposes, from evaluating the maturity of security controls to demonstrating due diligence in securing...Read More
The recent discovery of Log4J and its widespread impact on businesses highlights the importance of scanning networks to identify and mitigate software vulnerabilities. But periodically scanning networks is the easy part of building an effective vulnerability management program. Since these “programs” aim to identify and fix software vulnerabilities, ongoing management must include a schedule of...Read More
Let’s face it everyone wants to keep things as simple as possible. n a perfect world, there would be a “single” cyber security technology that protected every organization from all cyberthreats. but, unfortunately, the complex nature of building and managing an effective cyber security program cannot be done with a single technology…simply stated there is...Read More
In early October, Deputy Attorney General Lisa O. Monaco announced a Civil Cyber-Fraud Initiative to combat cyber threats in the supply chain. Efforts will focus on identifying defense and other government contractors that are not adhering to required cybersecurity standards. Read more about the announcement here – Deputy Attorney General Lisa O. Monaco Announces New...Read More
Working from home has settled in as the new normal, so there are many new risks that enter your business data protection equation. Cyber risk in your company is growing. Don’t kid yourself…it’s not just the big companies that are the targets of attacks. Companies just like yours are being attacked daily (link to https://cyware.com/category/breaches-and-incidents-news)....Read More
Every workplace has made changes during the COVID-19 pandemic. With employees struggling to balance changing business dynamics, many companies are pushing cybersecurity concerns down on the list of priorities. Deprioritizing cybersecurity is a mistake. The migration to work from home environments introduces new variables that increase exposure to malware attacks, phishing, and other cybercrime. In...Read More
Over the last decade, the number of devices in homes has increased drastically. According to Deloitte, the average U.S. home now has 11 internet-connected devices. Due to COVID-19 and the increase of remote work and school, that number has likely increased in the last few months. As we bring more devices into our homes, it’s...Read More
As COVID-19 impacted operations for many businesses across the world, a work from home environment has quickly become a new normal for many employees. In WFH scenarios, company and client data is exchanged between desktop devices and servers that reside in corporate facilities or the cloud. How that data is managed in transit and at...Read More