Category: Cybersecurity

Cybersecurity

Don’t Fall Victim to Cybersecurity Scare Tactics

Pay attention to the method of a cybersecurity attack, not the attribution Walk into any major cybersecurity conference, and you’ll feel like you are walking into the trailer for a horror movie. Scary threats and psychopathic criminals are everywhere, the vendors say, as they try to convince you that only

Read More »
Cybersecurity

Things That Go Bump in the Night… Part 4

In security, seemingly harmless things can be very dangerous Cybersecurity month is coming to an end and Halloween is almost upon us but we still have one “monster” left to unmask. In the final installment of our series on “Things that go bump in the night”, we look at the devious

Read More »
Cybersecurity

Things That Go Bump in the Night… Part 3

Why passwords can pose so much risk to your organization So, we’ve seen that not all monsters are as fearsome as they may seem on the surface, but what about the reverse? How do you know when something that seems like no big deal actually poses a huge risk to your

Read More »
Cybersecurity

Things That Go Bump in the Night… Part 2

There are many low-cost processes and procedures that deliver high security value Was that scratching noise a mouse in the server room? Or, some nefarious creature stalking your organization’s valuable data? Sometimes the things that we think are mortal threats can be easily mitigated, yet every day processes can be

Read More »
Cybersecurity

Things That Go Bump in the Night… Part 1

Fearful Foes Unveiled: Ransomware Demystified – Part 1 In cybersecurity, not all “monsters” are as scary as they may first seem. Others are far scarier than you ever thought. View this infographic, the first in a series of four, to meet our first “monster” – ransomware – and find out

Read More »
Cybersecurity

Does Open Source Leave You Open to Cyberattacks?

From a vulnerability and quality perspective, there’s nothing about OSS that’s inherently more or less risky Usage of open source software (OSS) libraries and components is just about ubiquitous these days. Even organizations with policies prohibiting the use of open source code will find that someone, somewhere is running an

Read More »
Cybersecurity

Maximizing the Value of Your Cyber Insurance Policy

Navigating Cyber Insurance: Strengthening Your Security Posture for Effective Coverage As growing numbers of organizations digitize aspects of their operations or embrace digital business models, cyber risk is assuming life-or-death proportions for more and more companies. While business leaders have long been accustomed to managing risks amidst uncertain conditions, those

Read More »
Cybersecurity

How to Manage Insider Risk

Should companies worry about the cybersecurity risks posed by their own employees? One of the most common questions we get from our clients is how much they should worry about the cybersecurity risks posed by their organization’s own employees. They often want to know whether their biggest risks are internal

Read More »
Cybersecurity

Top 4 Work-from-Anywhere Cybersecurity Tips

Four Recommendations for Stakeholders Who Want to Increase Their Organizations’ Cyber Resilience By now, we’re all familiar with the fact that the world of work has undergone dramatic change over the past two years. The abrupt office closures and large-scale shift to remote work that took place in 2020 were

Read More »
Technology Product Security: Maturing Your Program
Cybersecurity

Technology Product Security: Maturing Your Program

Organizations that want to bolster their resilience against cybersecurity risks will need to build a robust internal cybersecurity program or seek help from an MDR provider Once upon a time, in what’s now a bygone era, computers were computers, cars were cars and toasters were toasters. In today’s increasingly connected

Read More »