4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...
Which Solution Is Best to Control Access?

Which Solution Is Best to Control Access?

Recently a customer asked us to compare Privileged Access Management (PAM) and Password Manager (PM) products, thinking they were the same thing. Single Sign-On (SSO) is also often confused for these other two types of products. Let’s look at each and their...
NIST CSF – Part 4 – Respond

NIST CSF – Part 4 – Respond

Today we continue down the National Institute of Standards and Technology Cyber Security Framework (NIST CSF).  In our earlier blog posts, we learned how to identify our assets and then we did our best to protect them. Then since nothing is 100% secure, we detected...
Cybersecurity Risks Are Threatening Deals

Cybersecurity Risks Are Threatening Deals

Recent acquisitions highlight the threat that cyber risks can pose to a company’s reputation and bottom line.  When Verizon was making a bid for Yahoo’s internet business, the sale price was discounted $350,000 million after Yahoo’s security breaches were...
Why Do You Need Dark Web Monitoring?

Why Do You Need Dark Web Monitoring?

Have you ever Googled your own name and been surprised by some of the information you found?  Comments on a blog post from years back, maybe an old email address from a past job, or an article about your involvement in a charity event.  Now imagine you were searching...
The Accidental Insider Threat – A clear and present risk

The Accidental Insider Threat – A clear and present risk

Media images depict the unknown ‘hooded’ bad actor in the dark room with many computer screens and we often forget about one the biggest risks organizations face – the insider. The insider can be broken into two categories, 1) the accidental insider who is duped...