Blog Posts
View Article
Developing, Implementing and Enforcing a Social Media Policy25 January 2017
As social media is advancing and becoming more accessible, it can be difficult for users to separate their business and personal profiles. As a result, it is important for companies to develop and implement guidelines for their employees, in order to protect their personal information and internal company information. Development There are several important concepts […]
Learn More
View Article
How to Talk to Executives about Cyber Security19 January 2017
Despite the constant stream of data breaches, Chief Information Officers (CIO), Chief Information Security Officers (CISO) and risk managers continue to struggle to get the attention of their senior executives and board members on the topic of cyber security risk management. Senior executives frequently lack the technical knowledge necessary to fully grasp how vulnerable their […]
Learn More
View Article
HIPAA Security Rule Risk Assessment Overview10 January 2017
The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 and celebrated its 20th anniversary in 2016. The Final Rule on Security Standards (“HIPAA Security Rule”) was enacted in 2003 and covered entities (CE) were expected to be compliant by 2005. Despite the fact that the HIPAA Security Rule (HSR) has been a […]
Learn More
View Article
Ransomware05 January 2017
Over the past several years, there has been a dramatic increase in viruses and malware that affect computers and network devices worldwide. It often happens when a user opens and downloads an unknown file that appears to be legitimate, but actually contains a virus that can disrupt computer and network operations. Businesses lose billions of […]
Learn More
View Article
Top Misconceptions of Cyber Assessments14 December 2016
One of the biggest challenges of strengthening your organization’s network security is understanding where to begin. Security vendors are constantly pushing new hardware and software on organizations to solve their problems, but there is no “one solution” to cyber security. A cyber security risk assessment helps organizations identify their unique areas of weakness so they […]
Learn More
View Article
Building Your 2017 Cyber Security Plan08 December 2016
As we rapidly approach the end of 2016, most organizations are in the midst of finalizing their 2017 plans. Year-end planning typically focuses on traditional areas such as sales projections, budget requirements, and product development initiatives. One area that may be overlooked is cyber security risk management planning. Organizations (regardless of size) across all industries […]
Learn More
View Article
Insider Threat Mitigation29 November 2016
It Only Takes One In today’s world of cyber security, it is not enough for organizations to simply focus on technical defenses to prevent a data breach. While many security vulnerabilities for servers, desktops, routers, etc. can be addressed through a patch update, there are no patches for employee negligence. Infosecurity Magazine states “Among companies […]
Learn More