Tag Archives: Fairfield County Cybersecurity

Microsoft office security

The Concerning Reality of Microsoft’s Email Security

Are you trusting Microsoft Office 365’s built in security? With data security compliances such as HIPAA, GDPR, DFARs and the risk of crippling consequences of subsequent breaches, you shouldn’t solely rely on these built in features. Within the past eight years, the use of email has grown exponentially, becoming the primary business collaboration tool. Organizations […]

Read More

data leak

Data Leak Alert: Protect Your Organization

Are you one of the 885 million consumers affected by the First American Financial data leak? Last Friday, files stored on the First American Financial company’s website (firstam.com), contained bank account numbers, bank statements, mortgage records, tax documents, wire transfer receipts Social Security numbers and photos of driver’s licenses. Information dated back to 2003 was […]

Read More

The Scary Truth Behind Phishing Attacks

A company of 50 employees may seem “too small” to be targeted for a cyber attack but to a cyber criminal, there are 50 possible attack vectors to exploit. Inbound spam filtering and outbound web filtering may be helpful. It is recommended to provide periodic cyber awareness training and enforce security policies. But all it […]

Read More

YOU’RE ENTERED!

You’re entered! We are so excited that you are interested in attending our event! You will receive a personal invite if you are selected. Remember, ticket availability is limited so don’t miss out on more upcoming opportunities to win a spot into our invite-only event. If you’ve already received an invite, CONGRATS! Each additional entry […]

Read More

NIST Cybersecurity Framework

Implementing the NIST Cybersecurity Framework

Last week we discovered the biggest reasons to implement the NIST Cybersecurity Framework into your current cybersecurity program. If you missed the post, you can read it here. So now that you’ve decided to use the NIST CSF as your guideline framework, the next step is to prepare for implementation. Here are three tips to […]

Read More

TRAVELERS CHAMPIONSHIP

Kyber Security is holding an exclusive event on June 21 at the Traveler’s Championship! Join us for a day filled with golf and cybersecurity. Ticket availability is limited so register today! You don’t have to be a golf fanatic to enjoy this event.Fill out the form to the right to register for this event. Upon […]

Read More

NIST Cybersecurity Framework

3 Reasons to Align With the NIST Cybersecurity Framework

What is the NIST Cybersecurity Framework? The National Institute of Standards and Technology (NIST) is a government entity with a mission to promote innovation and industrial competitiveness. They created the Cybersecurity Framework as a voluntary set of standards, guidelines, and practices designed to help organizations manage IT security risks. Companies can utilize this framework to […]

Read More

board approval

Industry Spotlight: Credit Unions – Getting the Board On-Board With Cyber Security

The fight against cyber threats continues to grow more difficult every day, particularly in the financial sector. In fact, the threat of cyber security may very well be the biggest threat to the U.S. financial system. It’s best to mitigate this risk with a complete defense-in-depth program involving threat identification, protection, detection, response and recovery. […]

Read More

data breach impact

The Top 3 Impacts of a Data Breach

We often talk about the hard costs of lost data as a result of ransom amounts, use of resources, legal fees, and regulatory fines, but these are only the short term costs. In the long term, the soft costs are more troubling. These costs include customer loss, tarnished brand reputation, and productivity loss. While soft […]

Read More