Which are you more afraid of sharks or cows? Most people would immediately answer “sharks.” This is an example of availability bias, because we know and hear about shark attacks we assume they are a greater risk. The reality is that sharks kill about 5...
A question that often comes up around cybersecurity and incident response is when to involve legal. The best time to get advice from your attorney is before an incident. Here are 5 tips from legal resources of steps to take NOW: 1) Obtain verification from key...
Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...
Media images depict the unknown ‘hooded’ bad actor in the dark room with many computer screens and we often forget about one the biggest risks organizations face – the insider. The insider can be broken into two categories, 1) the accidental insider who is duped...
A look at the recently released cybercrime report by Malwarebytes that focuses on ransomware has some interesting takeaways: First the United States is the target 53% of the time. Canada came in second at a distant 10%.The top 5 states targeted were in order: Texas,...
The Department of Defense (DoD) recently announced the development of the ”Cybersecurity Maturity Model Certification” (CMMC), a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (DIB), particularly as it relates to...