Blog
Page 79 of 152
Protecting Data at Rest vs. Data in Motion
Data theft can devastate any company, resulting in lost profits, regulatory enforcement, litigation, and reputational damage that can be difficult to overcome. Every organization must protect its customer data and assure that sensitive information is kept safe. That said, the data in your company’s possession is held in different states – and each of these […]
January 4, 2022
How to Implement Third-Party Risk Management Policies
Third-party risk management needs a new approach because (let’s be honest here) the current approach doesn’t work. According to Gartner, 83 percent of legal and compliance leaders identify third-party risks after initial onboarding and due diligence. This suggests traditional due diligence methods in risk management policy are failing to capture new and evolving third-party risks. […]
Top Security Risks of Cloud Computing & How to Avoid Them
The need for versatile and affordable solutions for storing and processing data in enterprises makes cloud computing an increasingly attractive IT strategy. Cloud computing provides flexible and easy-to-use solutions. It can also be more cost-effective than traditional storage methods that require a physical server and hardware at your corporate premises, which is one of the […]
How Compromised Credentials Could Put Your Business at Risk
Lost or stolen user access credentials are a chronic, widespread cause of cybersecurity breaches. By mid-2020, 80 percent of hacking-related breaches and 77 percent of cloud breaches involved the use of compromised credentials. The number of corporate credentials with unencrypted passwords posted on the dark web soared by more than 400 percent, leaving organizations vulnerable […]
Notes on Cybersecurity and Operational Risk
This article first appeared on radicalcompliance.com December 12th, 2021 Last week one of the country’s top banking regulators published its semi-annual report on risks to the financial system, and to no surprise cybersecurity risk was near the top. The more one ponders the findings, however, the more you can see insights about cybersecurity, internal control, […]
December 22, 2021
How to Build a Risk Management Plan
7 STEPS TO AGILE RISK MANAGEMENT IN THE AGE OF DISRUPTION The face of risk has never been more amorphous and elusive. Because the same technologies driving the digital revolution – AI, machine learning, and 5G – are also elevating the sophistication of cyber attacks. SolarWinds underscored the obsolescence of traditional, reactive approaches to risk […]
December 21, 2021
Reciprocity Listed on 2021 Deloitte Technology Fast 500, the Fastest-Growing Companies in North America
Reciprocity is honored to be named to the 2021 Deloitte Technology Fast 500™ list of the 500 fastest-growing technology, media, telecommunications, life sciences, fintech, and energy tech companies in North America. Reciprocity grew 352% during this period. Reciprocity’s Executive Vice President of Product, Michael Maggio, credits this growth to the fact that the market is […]
December 17, 2021
What Is Threat Intelligence Monitoring?
Broadly speaking, threat intelligence monitoring is an organization’s ability to observe and understand various threats to its IT operations and confidential data in the company’s possession. This includes monitoring external threats to your business (say, cyber attackers looking for potential targets) and internal evidence that an attack may have already happened (for example, malware found […]
Best Practices of Cybersecurity Risk Management
Cyber threats are everywhere, regardless of your organization’s size or industry. Businesses today must adopt a systematic, disciplined cybersecurity plan to secure vital infrastructure and information systems — that is, a cybersecurity framework. Cybersecurity risk management encompasses identifying, analyzing, assessing, and addressing cybersecurity threats to your organization. In this sense, the first part of any […]
Key Components of Operational Resilience
Cybersecurity attacks, weather disasters, supply chain disruptions, and the global pandemic show us that threats to routine business operations are ever present. This means that putting a strategy in place to assure your company’s survival in difficult times — otherwise known as operational resilience — should be a paramount concern for any organization. Operational resilience […]
Page 79 of 152