Category Archives: Data Security

Penetration Testing

Thorough penetration testing involves social engineering, vulnerability scanning, and the manual hacking of computer systems, networks, and web applications. Several regulatory compliances and standards recommend and/or REQUIRE pen tests. Some examples include PCI, SOX, HIPAA, GLBA, FISMA, NIST, DFARS etc. PCI-DSS regulations mandate both an annual and ongoing penetration testing after any system changes. SOX […]

Read More

email hyjacking

Email Hyjacking

This could happen to you You regularly handle proprietary financial information for your organization. Investors, clients, and potential partnerships trust your word and advice which you often communicate via email. You’ve recently started noticing something a bit fishy with your emails but nothing seems too concerning. Then you start to catch a couple more red […]

Read More

MFA

Multifactor Authentication Can’t Stop ALL Cyber Attacks

Multifactor Authentication (MFA) was developed to help protect unauthorized user logins. In the past, this defense was extremely effective and (contrary to the rumor mill) continues to be effective today. However, hackers continue to develop new approaches to phish users, access credentials, spy on browser activity, and compromise machines. As these cyber threats continue to […]

Read More

October

Own IT. Secure IT. Protect IT.

In a new study, 80% of SMB respondents reported being “somewhat” or “very” concerned about a cyber breach but only 31% reported that their companies provide them with annual company-wide training. With National Cybersecurity Awareness Month beginning today, we can help bridge that gap. Established by the Department of Homeland Security, October serves as the […]

Read More

phishing scam

Post Cyber Incidents Phishing Scams Arise

In the month of July, The Identify Theft Resource Center identified 110 data breaches. Of which, over 106 million records were exposed across the financial, business, education, government, and health care sectors. Whether you were affected by these breaches or not, you are still susceptible to phishing scams targeting post breach victims. Capital One Breach […]

Read More

pii

Your Personal Information is Exposed… Again

We see headlines such as “Capital One Suffers Data Breach Affecting Over 100 Million Across America” all the time. Sadly, the more we see headlines like these, the more desensitized we are to them. We see our personal information exposed such as names, email addresses, and even social security numbers as a normal everyday occurrence. […]

Read More

NIST Cybersecurity Framework

The NIST Cybersecurity Framework 5th Anniversary

In five years, NIST has gone from being a framework to help develop an effective security program and posture, to a recognized process that has enabled successful conversations to bridge the gap between security and senior leadership. The NIST Cybersecurity Framework (CSF) was originally introduced at a time when large-scale cyber attacks (such as CryptoLocker […]

Read More

resigns

CEOs: The Cybersecurity Breach is Your Fault

As a CEO, it is your duty to grow your business and protect it from anything that could hinder its achievements and progress. Cybersecurity is no exception. It is time for CEOs to take the reins on cybersecurity, not only for the well-being of their organizations, but also for themselves. A Gartner analysis of security […]

Read More

cybersecurity business travel

Cyber Security Tips for Business Travel

Do you or your employees travel for business? You may enforce strict IT security policies in the office but are they effective outside of the office?  I know when I travel, my brain turns to mush. I am usually more concerned about where I am going rather than what Wi-Fi network my phone is connected […]

Read More

board approval

Industry Spotlight: Credit Unions – Getting the Board On-Board With Cyber Security

The fight against cyber threats continues to grow more difficult every day, particularly in the financial sector. In fact, the threat of cyber security may very well be the biggest threat to the U.S. financial system. It’s best to mitigate this risk with a complete defense-in-depth program involving threat identification, protection, detection, response and recovery. […]

Read More