Tag Archives: Connecticut cybersecurity

Supply Chain Hacking

No matter how robust your internal cybersecurity strategy is, your supply chain could be your weakest [and most costly] link. In a new string of targeted attacks, attackers will target the most vulnerable part of a supply chain to reach their intended victim. This specific hacking operation, known as Tortoiseshell, targets IT providers with malware. […]

Read More

Will the New DoD Standard Crush Your Business?

The Defense Department recently released a new draft of the Cybersecurity Maturity Model Certification (CMMC). The goal of this certification is to create a simpler and more consistent framework for the cyber demands imposed on government contractors and subcontractors. The CMMC will review and combine various cybersecurity standards and best practices and map these controls […]

Read More

hurricane dorian

Cyber Scammers Will Rub Salt on the Wounded

A couple weeks ago, Hurricane Dorian struck and devastated our friends in the south. After natural disasters like Hurricane Dorian, cyber scams often target people who are in need or looking to help those in need. Many affected victims need to get their homes cleaned up or repaired and bystanders are looking to help relief […]

Read More

phishing scam

Post Cyber Incidents Phishing Scams Arise

In the month of July, The Identify Theft Resource Center identified 110 data breaches. Of which, over 106 million records were exposed across the financial, business, education, government, and health care sectors. Whether you were affected by these breaches or not, you are still susceptible to phishing scams targeting post breach victims. Capital One Breach […]

Read More

#CrackTheHack

Celebrate National Cybersecurity Awareness Month with us this October! Join us for a morning of interactive employee awareness training. We want you to start thinking like a hacker so you can solve the mystery hack before time runs out. In our clue/escape room style setup, we will test your skills to find out if you […]

Read More

pii

Your Personal Information is Exposed… Again

We see headlines such as “Capital One Suffers Data Breach Affecting Over 100 Million Across America” all the time. Sadly, the more we see headlines like these, the more desensitized we are to them. We see our personal information exposed such as names, email addresses, and even social security numbers as a normal everyday occurrence. […]

Read More

NIST Cybersecurity Framework

The NIST Cybersecurity Framework 5th Anniversary

In five years, NIST has gone from being a framework to help develop an effective security program and posture, to a recognized process that has enabled successful conversations to bridge the gap between security and senior leadership. The NIST Cybersecurity Framework (CSF) was originally introduced at a time when large-scale cyber attacks (such as CryptoLocker […]

Read More

resigns

CEOs: The Cybersecurity Breach is Your Fault

As a CEO, it is your duty to grow your business and protect it from anything that could hinder its achievements and progress. Cybersecurity is no exception. It is time for CEOs to take the reins on cybersecurity, not only for the well-being of their organizations, but also for themselves. A Gartner analysis of security […]

Read More

cybersecurity business travel

Cyber Security Tips for Business Travel

Do you or your employees travel for business? You may enforce strict IT security policies in the office but are they effective outside of the office?  I know when I travel, my brain turns to mush. I am usually more concerned about where I am going rather than what Wi-Fi network my phone is connected […]

Read More

Microsoft office security

The Concerning Reality of Microsoft’s Email Security

Are you trusting Microsoft Office 365’s built in security? With data security compliances such as HIPAA, GDPR, DFARs and the risk of crippling consequences of subsequent breaches, you shouldn’t solely rely on these built in features. Within the past eight years, the use of email has grown exponentially, becoming the primary business collaboration tool. Organizations […]

Read More