Revisit Your Password Policies to Retain PCI Compliance
Published on June 16, 2022
via Bleeping Computer Ever since 2004, the payment card industry has required merchants who accept credit card payments to adhere to the Payment Card Industry Data Security Standards (PCI DSS, often shortened to PCI). This requirement doesn’t just apply to merchants, but is applicable to…
Actions to Take When the Cyber Threat is Heightened
Published on May 13, 2022
via UK National Cyber Security Centre Balancing cyber risk and defence The threat an organization faces may vary over time. At any point, there is a need to strike a balance between the current threat, the measures needed to defend against it, the implications and…
1 Year Later: Actions Taken, Lessons Learned Since The Colonial Pipeline Cyberattack
Published on May 9, 2022
via Forbes A lot has happened in response to the Colonial Pipeline cyberattack a year ago today that created a crisis for the company and the country. President Joe Biden took steps to improve the country’s defenses against future cyberattacks and signed a bill into law that is designed to improve…
Responding to Heightened Cyberattack Risk: Focus on the Basics
Published on April 11, 2022
via CSO Online Take care of security basics first When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on…
How to Protect Your Devices Against a Cyberattack
Published on March 23, 2022
Via ABC News A cyber security expert is sharing steps you should take, to protect yourself from a potential cyberattack. Hackers are already trying to break through, according to cyber security expert Randy Marchany. He said they're seeing an increase in probing, which means hackers…
How to Build a Culture of Cybersecurity
Published on March 17, 2022
Via MIT Sloan School of Management Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture. At a large bank, the CEO kicks off every all-staff meeting with a cybersecurity story,…
7 Pressing Cybersecurity Questions Boards Need to Ask
Published on March 14, 2022
Via Harvard Business Review For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of…
Don’t Ditch the Password Yet: Countering a Brute Force Attack
Published on February 15, 2022
There’s been a lot of chatter lately about moving on from passwords. But long passwords are still a good defense against some types of attacks. Brute force attack actors dedicate just a fraction of their efforts to cracking them, a Microsoft researcher found. The researcher…
What You Need to Know About Data Encryption Right Now
Published on February 4, 2022
via Security Intelligence You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you…
Small Business Cybersecurity: What to Fix, What to Manage, and What to Outsource
Published on January 19, 2022
via Security Intelligence The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the…