Category Archives: Data Breach

Microsoft office security

The Concerning Reality of Microsoft’s Email Security

Are you trusting Microsoft Office 365’s built in security? With data security compliances such as HIPAA, GDPR, DFARs and the risk of crippling consequences of subsequent breaches, you shouldn’t solely rely on these built in features. Within the past eight years, the use of email has grown exponentially, becoming the primary business collaboration tool. Organizations […]

Read More

data leak

Data Leak Alert: Protect Your Organization

Are you one of the 885 million consumers affected by the First American Financial data leak? Last Friday, files stored on the First American Financial company’s website (firstam.com), contained bank account numbers, bank statements, mortgage records, tax documents, wire transfer receipts Social Security numbers and photos of driver’s licenses. Information dated back to 2003 was […]

Read More

board approval

Industry Spotlight: Credit Unions – Getting the Board On-Board With Cyber Security

The fight against cyber threats continues to grow more difficult every day, particularly in the financial sector. In fact, the threat of cyber security may very well be the biggest threat to the U.S. financial system. It’s best to mitigate this risk with a complete defense-in-depth program involving threat identification, protection, detection, response and recovery. […]

Read More

data breach impact

The Top 3 Impacts of a Data Breach

We often talk about the hard costs of lost data as a result of ransom amounts, use of resources, legal fees, and regulatory fines, but these are only the short term costs. In the long term, the soft costs are more troubling. These costs include customer loss, tarnished brand reputation, and productivity loss. While soft […]

Read More

Third Party Due Diligence Could Prevent Your Next Cyber Breach

Cyber risk is often unaddressed in the due diligence process of vetting or monitoring a third party. Therefore, transfer of cyber risk is an afterthought and a common blind spot. With the ease and accessibility of outsourcing core competencies, this risk continues to be a big issue. It’s not enough to strengthen your own cybersecurity […]

Read More

Create a Proactive Cybersecurity Strategy with MDR

If your idea of cybersecurity is a firewall and anti-virus then your organization is at extreme risk. Data breaches are no longer isolated cases in today’s ever-evolving threat landscape. Anything from misconfiguration, patch lags, and unsecure software or system components can lead to unsecure breach points. Bridging security gaps, responding to threats, and remediating data […]

Read More

dark web

Why wouldn’t you want to protect your brand?

The risk of having your personal information stolen is ever present, regardless of how carefully you guard your information. Without proper security measures, your intellectual property, reputation and brand are at risk. This risk includes the dark web; the part of the internet that is intentionally hidden from search engines and is only accessible through […]

Read More

Network Security Study

Network Security Study A network security study is a helpful guide that will give you valuable insight into your environment and remediation plans for potential risks. With the guidance of our virtual Chief Information Security Officer (vCISO), you will be able to evaluate your defensive posture and overall operational security. The study will leave you […]

Read More

When is the Last Time you had a Network Security Study?

We often hear from small business owners that they had either never heard of a network security study or they haven’t had one recently. If you can relate, you should keep on reading. A network security study is a helpful guide that will give you valuable insight into your environment and remediation plans for potential […]

Read More