Nov 13, 2019

Disaster Plan: Your Business Needs One ASAP

By | November 13th, 2019|Ask The Experts, Guest Post, Tips and Tricks|

Maybe your business has never experienced a major disaster before, which is all the more reason to prepare for one. Hurricanes, tornadoes, fires, and floods annually inflict billions of dollars in damages on businesses across the country. It seems fairly obvious that your business should have a disaster plan in [...]

Aug 01, 2019

Cybersecurity careers: Which one is right for you?

By | August 1st, 2019|Guest Post|

Data breaches, hackers and viruses are a daily reality for organizations across the world. Cyberattacks don’t discriminate. From small business start ups to established commercial giants, no one is safe from a potential attack. This has put an even bigger spotlight on the cybersecurity needs and practices of organizations, which, [...]

Jul 18, 2019

Disaster Recovery: Ensuring security and privacy

By | July 18th, 2019|Guest Post|

When the unthinkable happens, it’s imperative that you have your critical systems and data backed up and ready for restoration. But if you aren’t taking the necessary measures to keep your disaster recovery process secure, you’ve only done half your job. Here are a few things every disaster recovery plan [...]

Jul 11, 2019

Car hacking: How secure is your vehicle?

By | July 11th, 2019|Guest Post|

As vehicle technology advances, interconnectivity increases. Cars are now smarter than ever, and with increased tech comes increased vulnerability. Car hacking, while not common, is becoming a more and more pressing issue. And the consequences can range from minor to outright devastating. In 2015, security researchers Chris Valasek and Charlie [...]

Jul 03, 2019

What Does Your ISP See When You’re Using the Internet?

By | July 3rd, 2019|Guest Post|

Unless you’re having issues with your internet service, you probably don’t put much thought into what your ISP, or internet service provider, is doing. But, have you ever taken a minute to think about what your ISP can see when you’re connected to the Internet? Just like Google, your ISP [...]

Jun 06, 2019

Credit Card Skimming is an Increasing Risk for eCommerce Retailers

By | June 6th, 2019|Guest Post|

Credit card skimming – the use of hardware or software to steal credit card details – has long been a problem for retailers and the credit card industry. Whether criminals attach physical skimming machines to ATMs or inject skimming software into eCommerce applications, skimming hurts customers and retailers alike. But [...]

May 08, 2019

How Do Security Breaches Affect Reputation and Operations?

By | May 8th, 2019|Guest Post|

Data is the lifeblood of all businesses in the 21st century. Organizations use data for competitor analysis, market behavior prediction, process optimization, and more. With the right data, companies can easily get an edge in their industries and optimize their performance to lower costs and make higher profits. This explains [...]

Apr 24, 2019

Your Security Awareness Program: Make it personal

By | April 24th, 2019|Guest Post|

User engagement represents one of the biggest challenges a security awareness program (SAP) can face. With so many processes, procedures, policies, and content being pushed to employees on a nearly daily basis, it can be an overwhelming amount of information for any individual to retain (or even care about). Knowing [...]

Apr 17, 2019

Security Awareness Programs: How much do they cost?

By | April 17th, 2019|Guest Post|

A common misconception about security awareness programs (SAPs) is that they are expensive to implement and maintain. When you consider all the things that might be included—headcount, content creation, on-site events, SWAG, security compliance courses, and phishing assessment tools—SAPs seem like costly ventures. However, organizations both large and small can [...]

Apr 09, 2019

Cyber Disruption: How to Prepare & What to do During an Incident

By | April 9th, 2019|Guest Post|

The new normal: a massive data breach impacts hundreds of thousands of people, a denial-of-service campaign disrupts operations, a ransomware attack locks up systems. In today’s climate of cyber threats, it’s only a matter of when — not if — organizations face an attack and must deal with the consequences. [...]

Load More Posts