Blog
Page 55 of 152
Guidelines You Should Consider to Manage and Secure Consumer Data
In 2017, Equifax, one of the largest credit bureaus in the United States, suffered a data breach that exposed the personally identifiable information (PII) of 147 million consumers and the credit card information of more than 200,000 more. Following the incident, Equifax spent almost $1.6 billion to strengthen its cybersecurity defenses. The company also agreed […]
October 31, 2022
Analyzing Cybercriminal Reconnaissance to Improve Your Strategic Planning
“Reconnaissance” (recon) is a military term that refers to observing a target (usually in a clandestine way) and gathering information about it. The term and its meaning have also found its way into cybersecurity. Cyber attackers use a number of recon techniques to gather sensitive information about a target organization – which would be you. […]
5 Signs That Your Organization Could Benefit from Data Security Automation
Security automation is an efficient and cost-effective way to protect your data resources from malicious cyber threat actors. The right tools require no human intervention for threat detection, analysis, and mitigation. This can be a massive advantage if your cybersecurity team is overwhelmed with huge alert volumes and if your information is at risk of […]
How to Automate Your Data Security Processes
Stolen data is a lucrative line of work for cyber criminals. The Dark Web Price Index, an annually published list of “products” for sale on the dark web, listed prices in 2021 that ranged from 1,000 Spotify followers for $2 to verified Stripe accounts, fetching as much as $6,500. That prospect of financial reward means […]
How Compliance Can Strengthen Your Risk Posture
In the age of digital business, protecting your organization’s digital assets from cyber threats and reducing your cyber risk exposure has never been more critical – or more complicated. At the same time, most organizations must comply with numerous industry and government regulations that dictate data privacy and IT security standards. To manage cybersecurity threats […]
Creating a Successful Cybersecurity Risk Management Plan
Whatever industry you work in or however large your business is, one thing is true: every company with a desire to stay competitive and relevant needs a cybersecurity risk management plan. New information technology comes online quickly, making business transactions and processes more manageable, smoother, and faster – but a high level of interconnectivity brings […]
What Are the Three Types of ISO Audits?
The International Organization for Standardization (ISO) has established a framework for three distinct types of audits: first-party, second-party, and third-party. Among these, the third-party audit holds the key to ISO certification, signifying ISO compliance with specific ISO standards. Audits play a pivotal role in contemporary corporate governance and risk management, and ISO standards represent a […]
Cybersecurity Awareness Month: Why Patching Your Software Is Crucial to Keeping You Protected
October 26, 2022
Powerful Cybersecurity Lessons from the Movies
Fact vs. Fiction: Cinema-based Cyber Risk Training… Forty years ago, Tron’s Kevin Flynn entered ENCOM’s mainframe computer to prove his boss stole his ideas. Today, stopping intellectual property theft is just as complex. And in many cases? Cyber thieves catch companies off guard: during a routine cybersecurity consult, one firm recently discovered China-sponsored hacker group […]
October 19, 2022
Page 55 of 152