Revisit Your Password Policies to Retain PCI Compliance
Published on June 16, 2022
via Bleeping Computer Ever since 2004, the payment card industry has required merchants who accept credit card payments to adhere to the Payment Card Industry Data Security Standards (PCI DSS, often shortened to PCI). This requirement doesn’t just apply to merchants, but is applicable to…
Cloud or Mainframe?
Published on June 7, 2022
via Dancing Dinosaur To respond to the ongoing pressures of the global pandemic and more, IBM observed that businesses around the world have turbo-charged their digital transformations. At least some of these priorities are companies looking to take advantage of cloud computing. Strategically, they…
ASPG, Inc. Announces Alliance Partnership with Sheltered Harbor
Published on May 23, 2022
Advanced Software Products Group (ASPG, Inc.) is delighted to announce a new alliance partnership with Sheltered Harbor, the financial industry-established and industry-led not-for-profit organization whose mission is to protect public confidence in the U.S. financial system if a cyberattack causes an institution’s critical systems and…
The Logic Behind Three Random Words
Published on May 18, 2022
via UK National Cyber Security Centre One of the most popular pages on the NCSC website, nearly 5 years after its first publication, is 'Three random words or #thinkrandom'. It explains how - by combining three random words - you can create a password that's…
Actions to Take When the Cyber Threat is Heightened
Published on May 13, 2022
via UK National Cyber Security Centre Balancing cyber risk and defence The threat an organization faces may vary over time. At any point, there is a need to strike a balance between the current threat, the measures needed to defend against it, the implications and…
1 Year Later: Actions Taken, Lessons Learned Since The Colonial Pipeline Cyberattack
Published on May 9, 2022
via Forbes A lot has happened in response to the Colonial Pipeline cyberattack a year ago today that created a crisis for the company and the country. President Joe Biden took steps to improve the country’s defenses against future cyberattacks and signed a bill into law that is designed to improve…
Responding to Heightened Cyberattack Risk: Focus on the Basics
Published on April 11, 2022
via CSO Online Take care of security basics first When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on…
How to Protect Your Devices Against a Cyberattack
Published on March 23, 2022
Via ABC News A cyber security expert is sharing steps you should take, to protect yourself from a potential cyberattack. Hackers are already trying to break through, according to cyber security expert Randy Marchany. He said they're seeing an increase in probing, which means hackers…
How to Build a Culture of Cybersecurity
Published on March 17, 2022
Via MIT Sloan School of Management Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture. At a large bank, the CEO kicks off every all-staff meeting with a cybersecurity story,…
7 Pressing Cybersecurity Questions Boards Need to Ask
Published on March 14, 2022
Via Harvard Business Review For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of…