Blog

Cyber Security

Categories

Archives

Cybersecurity in 2020

Cybersecurity in 2020 – A Look at the New Year Ahead

Why re-focusing your cybersecurity efforts for the New Year is particularly important in 2020. All you have to do is Google cybersecurity and you’ll see article after article with predictions for the coming year. While industry predictions are helpful, they can also be overwhelming and leave even board members and CEOs feeling paralyzed at the…

Read More
Photo by freestocks.org on Unsplash

Navigating Black Friday Shopping Online

Tackling your holiday shopping online? Read on for tips to help you stay safe and protect your identity, so you can relax and enjoy this holiday season. While we spend a lot of our time focusing on the security of both public and private sector organizations, we like to remind ourselves that your organizations are…

Read More
cybersecurity-awareness

Raising Cybersecurity Awareness: 7 Questions to Ask

Cybersecurity is a team effort. It’s no longer solely the responsibility of IT or cybersecurity departments to defend organizations against cyber attack. Cyber criminals can target any one, across all departments and roles, and this means that everyone plays a part in protecting networks, systems and data. Staying informed about cybersecurity best practices and understanding…

Read More
Rules to Avoid a Phishing Attack

Hard and Fast Rules of Evading Phishing Attacks

While phishing attacks are nothing new, they continue to be more inventive and of an exponentially greater quantity, causing us to pause and revisit what continues to be a serious issue for government organizations, businesses and individuals. The technique of Phishing has been around for years, and hackers continue to use it for one big…

Read More

Complacency Isn’t Affecting Election Security Progress, Unknowns Are

Recent news articles have focused on the unused HAVA funds that the Federal government has allocated for election security, and the implication is that this inaction is the result of a lack of urgency or a sense of complacency. Those of us on the frontlines of the election security challenge know that the issue is…

Read More

Pursuing Quality Threat Intelligence Insight

Attaining the “correct” Threat Insight By definition, “threat insight” provides an understanding of threats in the context of your company. Insight of any kind is interesting and potentially useful but the most key and critical insight is the insight specifically related to you. In this case, your company and the threats: the known knowns, the…

Read More

The One Thing That Makes Election Security Assessments Actionable

Whether your cybersecurity program is advanced or in its beginning phases, an election security assessment is a significant part of improving your cybersecurity stance. However, an assessment is only one step in strengthening your defenses against cybercrime. The actions and decisions that follow an assessment are the true determining factor of success. The methodologies and…

Read More

Metrics and Threat Intelligence: Why and How to Apply Them

In the maturity process of any organization, at some point metrics enter the equation. For many, this is a cringe-worthy event that ranks up at the top of the worst job-defining moments. It usually starts innocently. Someone asks a question. It could be a simple question, such as “How much money are we spending and…

Read More

What Is Digital Forensics?

Cybersecurity includes a vast number of different components, aspects, techniques and disciplines. From cyber intelligence to continuous threat monitoring and risk assessments, the full spectrum of cybersecurity activities spans an extensive range. One discipline within this range is digital forensics, and like all of the other activities in the security world, fully understanding what it…

Read More

Securing the Cloud

The freedom of access – to anything, anytime and anywhere – is the strength and peril of the cloud.  While the cloud empowers accessibility, its ubiquitous nature can also undermine security.  The same avenues that give us access to information we want and need also open ways for hackers and malicious actors to reach us….

Read More