1 Year Later: Actions Taken, Lessons Learned Since The Colonial Pipeline Cyberattack
Published on May 9, 2022
via Forbes A lot has happened in response to the Colonial Pipeline cyberattack a year ago today that created a crisis for the company and the country. President Joe Biden took steps to improve the country’s defenses against future cyberattacks and signed a bill into law that is designed to improve…
Responding to Heightened Cyberattack Risk: Focus on the Basics
Published on April 11, 2022
via CSO Online Take care of security basics first When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on…
How to Protect Your Devices Against a Cyberattack
Published on March 23, 2022
Via ABC News A cyber security expert is sharing steps you should take, to protect yourself from a potential cyberattack. Hackers are already trying to break through, according to cyber security expert Randy Marchany. He said they're seeing an increase in probing, which means hackers…
How to Build a Culture of Cybersecurity
Published on March 17, 2022
Via MIT Sloan School of Management Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture. At a large bank, the CEO kicks off every all-staff meeting with a cybersecurity story,…
7 Pressing Cybersecurity Questions Boards Need to Ask
Published on March 14, 2022
Via Harvard Business Review For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of…
Don’t Ditch the Password Yet: Countering a Brute Force Attack
Published on February 15, 2022
There’s been a lot of chatter lately about moving on from passwords. But long passwords are still a good defense against some types of attacks. Brute force attack actors dedicate just a fraction of their efforts to cracking them, a Microsoft researcher found. The researcher…
What You Need to Know About Data Encryption Right Now
Published on February 4, 2022
via Security Intelligence You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you…
Small Business Cybersecurity: What to Fix, What to Manage, and What to Outsource
Published on January 19, 2022
via Security Intelligence The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the…
The Top 5 Cybersecurity Tools to Implement Right Now
Published on January 11, 2022
via Infosecurity Magazine Since the beginning of the pandemic, the US Federal Bureau of Investigation (FBI) has reported a 400% increase in cyber-attacks. What’s more, as of July 31 2021, the FBI has reported a 62% increase in reported ransomware incidents since the beginning of the year as…
Bosses are Reluctant to Spend Money on Cybersecurity. Then They Get Hacked.
Published on December 8, 2021
Via ZDNet Preventing a cyberattack is more cost-effective than reacting to one - but many boardrooms still aren't willing to free up their budget. Many businesses still aren't willing to spend money on cybersecurity because they view it as an additional cost – and then…