IT Security
View Article
Are We too Connected? Thoughts and Takeaways from the RSA Conference Keynote Speakers17 February 2017
After opening remarks from John Lithgow, RSAC kicked off with a keynote from Dr. Zulfikar Ramzan, Chief Technology Officer, RSA entitled “Planning for Chaos.” Ramzan centered his talk around making ripples and how a single event can have an effect across wide ranges. The common theme was “drawing connections, not lines.” He drove this point […]
Learn More
View Article
How to Talk to Executives about Cyber Security19 January 2017
Despite the constant stream of data breaches, Chief Information Officers (CIO), Chief Information Security Officers (CISO) and risk managers continue to struggle to get the attention of their senior executives and board members on the topic of cyber security risk management. Senior executives frequently lack the technical knowledge necessary to fully grasp how vulnerable their […]
Learn More
View Article
Ransomware05 January 2017
Over the past several years, there has been a dramatic increase in viruses and malware that affect computers and network devices worldwide. It often happens when a user opens and downloads an unknown file that appears to be legitimate, but actually contains a virus that can disrupt computer and network operations. Businesses lose billions of […]
Learn More
View Article
Top Misconceptions of Cyber Assessments14 December 2016
One of the biggest challenges of strengthening your organization’s network security is understanding where to begin. Security vendors are constantly pushing new hardware and software on organizations to solve their problems, but there is no “one solution” to cyber security. A cyber security risk assessment helps organizations identify their unique areas of weakness so they […]
Learn More
View Article
Building Your 2017 Cyber Security Plan08 December 2016
As we rapidly approach the end of 2016, most organizations are in the midst of finalizing their 2017 plans. Year-end planning typically focuses on traditional areas such as sales projections, budget requirements, and product development initiatives. One area that may be overlooked is cyber security risk management planning. Organizations (regardless of size) across all industries […]
Learn More
View Article
Is Having a Secure Password Enough?24 October 2016
You have one very secure password. It is over 10 characters long, has special characters, and upper and lower case numbers. So how could this be a bad thing? Say you use your one very secure password for all, or the majority, of your account passwords. What happens when one of those accounts gets hacked? […]
Learn More