Blog
Page 56 of 152
Cybersecurity Awareness Month: Don’t get Caught! How Phishing Attacks Can Sink Your Organization
October 18, 2022
A Guide to Automating Risk Management
Automation is a critical component of risk management strategies, but businesses aren’t using it enough. Here’s how to change that. An Evolving Threat and Risk Landscape Over the past few years, unprecedented rates of change in the way companies do business sent organizations scrambling to accelerate their digital transformation with little time to consider the […]
October 12, 2022
Employee Spotlight: Lascelles Gonsalves, Senior Account Executive
Sales play a critical role in the success of a business by bridging the gap between a customer’s needs and the products or services the organization can provide that fulfill these needs. This is why account executives – like Lascelles Gonsalves – are key to Reciprocity’s success. They help to build loyalty and trust with […]
October 5, 2022
Cybersecurity Awareness Month: It’s Easy to Stay Safe Online When You Keep Risk In Mind!
October 3, 2022
What Is Proactive Risk Management?
Most organizations today function in a risk-prone environment. Those threats include operational, strategic, financial, cybersecurity, geopolitical, compliance, and third-party risk – and when you get to specific risks, depending on an organization’s size, location, and industry, the full number becomes enormous. Any of those risks might have a catastrophic impact on the company and long-term […]
September 30, 2022
What Is the Cost of a Third Party Data Breach?
Data breaches are cybersecurity events that can harm a company’s reputation, finances, and compliance. Far too often these days, breaches are caused by a company’s third parties – and they can also cost an awful lot of money to repair the damage. For example, in 2019 two breaches on Facebook data arose from third parties […]
How Internal Cybersecurity Threats Affect Your Cyber Risk Plan
In 2016, an article in the Harvard Business Review called out organizations that focused on external cybersecurity threats while ignoring the dangers from within – and rightly so. Today, about 66 percent of organizations believe malicious insider attacks are more likely than external attacks. This points to a growing (and welcome) awareness of internal cybersecurity […]
What is a Vendor Risk Management Program?
As your company grows, outsourcing specific tasks will likely become necessary. Whether procuring materials from outside manufacturers or contracting freelancers to help your marketing efforts, third- and even fourth-party vendors have become critical relationships in any developing business. Opening your organization to third parties has many benefits. However, it also exposes your company to new […]
Tags: Third-Party Management
Protecting Your Corporate Website as an Enterprise Risk Management Strategy
Protecting your corporate website as an enterprise risk management strategy helps you keep your data safe and protects your reputation.
Tags: Risk Management
Why Buying SaaS GRC Software Is a Smart Investment
As organizations and businesses around the world and across industries migrate their IT to the cloud, C-suites are faced with a new dilemma for governance, risk management and compliance (GRC) solutions: cloud versus on-premise software. Cloud computing and cloud-based software give organizations more agility – a factor many decision-makers consider as they plan the future […]
Tags: Technology
Page 56 of 152