Blog
Page 75 of 152
What is the Data Protection Family Tree?
Data protection is the set of processes and strategies that assure the privacy, availability, and integrity of your corporate data, including the personal data that your business collects or processes from clients. Also known as data security, these strategies encompass a variety of functions beyond the traditional “protection” concept. To describe this collection of processes, […]
February 15, 2022
What is a Whaling Attack & How to Avoid One
Everything there is to know about whaling attacks, including what they are and how your organization can protect itself against one. Threat actors today will do almost anything to get hold of an organization’s sensitive information. Like most criminals, however, cybercriminals usually target the victim that requires the least effort for the most reward. Take […]
Attack Surface Management: Strategies to Keep Your Business Safe
Attack surface is an important concept in cybersecurity. The larger an organization’s attack surface is, the greater its cybersecurity risks – and therefore, controlling the size of your attack surface becomes critical to successful cybersecurity risk management. So how can you reduce the size of your attack surface and protect your organization from cyberattacks and […]
What is HITRUST Compliance?
It is a constant challenge for the healthcare industry to comply with the Health Insurance Accessibility and Portability Act (HIPAA). HIPAA requires healthcare organizations and their business associates to secure protected health information (PHI) and electronic PHI (ePHI). The protections cover all the mediums and locations where companies create, access, store, or exchange sensitive information. […]
Tags: Audit Management, HITRUST
Risk Assessment Methodology You Should Know
Risk assessments are essential to a risk management program. Risk assessments identify existing and emerging threats (either internal or external) to a company’s information systems, data, and operations; so the company can then respond accordingly. Risk assessments can be time-consuming and arduous. Nonetheless, they must be conducted routinely to assure that you have adequate mitigation […]
February 10, 2022
What is a Brute Force Attack: How it Works and How to Prevent it
Brute force attacks are nothing new in cybersecurity. As far back as 2015 (eons ago, in technology terms) the global coffee chain Dunkin’ Donuts suffered a brute force attack that targeted nearly 20,000 of its customers. In this attack, cyber attackers used brute force to get unauthorized access to the accounts of more than 19,000 […]
What Is Defense in Depth?
“Defense in depth” (DiD) is a cybersecurity strategy inspired by military strategy, providing multiple layers of security controls to protect enterprise IT systems. Each layer of controls can block or mitigate different types of attacks. which in total makes it much more difficult for attackers to succeed. Using this strategy can strengthen your organization’s security […]
What is Reputational Risk?
A company’s reputation is a delicate thing. With an unfortunate sequence of mistakes or misconduct, years of customer loyalty and public goodwill can evaporate in moments, and some companies never recover. Safeguards to protect your corporate reputation should be part of any enterprise risk management plan. Many organizations, however, don’t include reputational risk when performing […]
Why is Corporate Cybersecurity Important?
Costs associated with cyberattacks are growing rapidly, particularly for businesses. That’s not likely to change any time soon. In its 2020 Year End Data Breach QuickView Report, Risk Based Security tracked 3,932 publicly reported data breaches in 2020, compromising more than 37 billion records. While the total number of publicly reported data breaches fell by […]
Controls & Risk: Two Sides of the Same Coin
They’ve attacked hundreds of companies and government agencies leveraging just one software update vulnerability. They’ve triggered nationwide gas shortages and price surges all from one compromised password. And they’ve even poisoned public water supplies after INFILTRATING… an unused computer running on Windows 7 with no firewalls and an old password. No, cybercriminals are not getting […]
February 8, 2022
Page 75 of 152