Jul 18, 2019

Disaster Recovery: Ensuring security and privacy

By | July 18th, 2019|Guest Post|

When the unthinkable happens, it’s imperative that you have your critical systems and data backed up and ready for restoration. But if you aren’t taking the necessary measures to keep your disaster recovery process secure, you’ve only done half your job. Here are a few things every disaster recovery plan [...]

Jul 11, 2019

Car hacking: How secure is your vehicle?

By | July 11th, 2019|Guest Post|

As vehicle technology advances, interconnectivity increases. Cars are now smarter than ever, and with increased tech comes increased vulnerability. Car hacking, while not common, is becoming a more and more pressing issue. And the consequences can range from minor to outright devastating. In 2015, security researchers Chris Valasek and Charlie [...]

Jul 03, 2019

What Does Your ISP See When You’re Using the Internet?

By | July 3rd, 2019|Guest Post|

Unless you’re having issues with your internet service, you probably don’t put much thought into what your ISP, or internet service provider, is doing. But, have you ever taken a minute to think about what your ISP can see when you’re connected to the Internet? Just like Google, your ISP [...]

Jun 06, 2019

Credit Card Skimming is an Increasing Risk for eCommerce Retailers

By | June 6th, 2019|Guest Post|

Credit card skimming – the use of hardware or software to steal credit card details – has long been a problem for retailers and the credit card industry. Whether criminals attach physical skimming machines to ATMs or inject skimming software into eCommerce applications, skimming hurts customers and retailers alike. But [...]

May 08, 2019

How Do Security Breaches Affect Reputation and Operations?

By | May 8th, 2019|Guest Post|

Data is the lifeblood of all businesses in the 21st century. Organizations use data for competitor analysis, market behavior prediction, process optimization, and more. With the right data, companies can easily get an edge in their industries and optimize their performance to lower costs and make higher profits. This explains [...]

Apr 24, 2019

Your Security Awareness Program: Make it personal

By | April 24th, 2019|Guest Post|

User engagement represents one of the biggest challenges a security awareness program (SAP) can face. With so many processes, procedures, policies, and content being pushed to employees on a nearly daily basis, it can be an overwhelming amount of information for any individual to retain (or even care about). Knowing [...]

Apr 17, 2019

Security Awareness Programs: How much do they cost?

By | April 17th, 2019|Guest Post|

A common misconception about security awareness programs (SAPs) is that they are expensive to implement and maintain. When you consider all the things that might be included—headcount, content creation, on-site events, SWAG, security compliance courses, and phishing assessment tools—SAPs seem like costly ventures. However, organizations both large and small can [...]

Apr 09, 2019

Cyber Disruption: How to Prepare & What to do During an Incident

By | April 9th, 2019|Guest Post|

The new normal: a massive data breach impacts hundreds of thousands of people, a denial-of-service campaign disrupts operations, a ransomware attack locks up systems. In today’s climate of cyber threats, it’s only a matter of when — not if — organizations face an attack and must deal with the consequences. [...]

Oct 23, 2018

8 Events That Changed Cybersecurity Forever

By | October 23rd, 2018|Ask The Experts, Guest Post, Security & Pop Culture|

Americans are required to take history classes throughout primary, secondary, and higher education. Why is that? Well, not only do we develop an understanding of how we came to be here today, but we also learn about key moments and the repercussions that follow. We learn about history so we [...]

Oct 02, 2018

The Security Implications of Using a Virtual PA

By | October 2nd, 2018|Ask The Experts, Guest Post|

Is Outsourcing Your Admin Safe? To put it plainly, the world of work has changed dramatically within the last several years. Once upon a time, a person could expect to stay in the same job, work from 9 A.M. to 5 P.M. each day, and travel both to and from [...]

Load More Posts