Check back for updates on Kyber Security’s latest upcoming events.
How Connecticut’s New Cybersecurity Law Impacts Your Business
The headlines are full of stories about website hacks that result in stolen data. Being a big company hardly seems to be a defense against these attacks. But small businesses are actually the bigger targets because their systems are often less sophisticated, less secure and subject to easier invasion. To protect their residents, many states including Connecticut have enacted new laws dealing with breaches of private information. While you may not think of your business as a collector of private information, you may be surprised what’s covered. As a business owner, you are now subject to new responsibilities in the event of a breach and more severe penalties when bad things happen if you have not prepared properly to protect your client data. Learn from cyber security experts what it takes to put the right safeguards in place to be shielded from both hackers and legal penalties.
The Circle of Trust: Protecting Your Organization With the NIST Cybersecurity Framework
No matter the size of your company or organization, cybersecurity is a crucial element for continued success. We’ve designed this webinar to share the “how to’s” of cybersecurity as recommended by NIST, the National Institute of Standards and Technology.
You, your team, your company or community group will learn the steps for understanding cybersecurity risks and the steps to mitigate them. Your particular industry may have additional and related cybersecurity, regulatory and privacy recommendations, so as a best practice, the information that follows is intended to be customizable, flexible and non-regulatory.
TANGO: Overcoming Cybersecurity Challenges in a Hybrid Work Environment
Over the last year, non-profit organizations have had to adapt to unprecedented change. One result of this change is the emergence of the hybrid work model. This flexible model comes with its own share of cybersecurity challenges, which stem from the blurry network perimeter created by employees using a mix of work and personal devices from their homes, offices, and other locations. As a result, many organizations are beginning to consider migrating resources to the cloud in an effort to better facilitate access for their dispersed workforce.
We’ll break down the key issues to focus on when updating cybersecurity policies and strengthening data protection measures, including:
- Incorporating new technology to support remote and office-based employees
- Additional access points and potential risks for unauthorized access
- Migrating resources to the cloud and associated security concerns
- Network security in the office and at remote locations
Your Inbox is for Sale: Business Email Compromise
Panel discussion from May 2021 with business professionals with different perspectives on email security and business email compromise.
The NIST Cybersecurity Framework: 4 Step Guide
The National Institute of Standards and Technology (NIST) is a government entity that created the Cyber Security Framework as a voluntary set of standards, guidelines, and practices designed to help organizations manage IT security risks. Companies of any size can utilize this framework to measure their cybersecurity practices relative to the threats they face. The NIST Cyber Security Framework (CSF) is comprised of five functions to help create plans to determine what to do before, during and after a cyber incident. The Framework is intended to compliment, not replace, an organization’s cybersecurity program. We developed a simple four step process to easily analyze and implement the Framework into your current program. Join us to learn how to establish goals, coordinate plans, and measure your success with the NIST CSF.
HIPAA Compliance is More than a Checkbox
While many organizations may simply check a box to avoid regulatory fines, the true value is creating a secure environment to protect your data. The cost of a cyber breach expands further than simply monetary expenses; it could lead to down time, loss of reputation, and possibly even closed doors.
By following a comprehensive HIPAA program, you will be on the path to compliance and data security. Just like cybersecurity, compliance is ongoing and ever changing. A complete program includes an ongoing solution allowing you to continually enhance your cybersecurity posture while protecting your valuable data.
Windows 7 Vulnerabilities
Don’t let Windows 7 weigh down your cyber defenses. Avoid massive security vulnerabilities by being proactive with your infrastructure upgrades. We will discuss the necessity of upgrading to Windows 10 before January 2020 and how to prepare for this big change.
The Road to GDPR Compliance
Most SMBs wrongly believe they are not subject to GDPR compliance due to their size or customer base. There are three major reasons why SMBs should be ready to face the newest cybersecurity regulation:
1. You may already be subject
2. You never know when you may become subject
3. It’s just good business
In this webinar, we will lead you down the road to becoming GDPR compliant guiding through our methodology and integrated services.