What is the cyber responsibility of Boards and C-Levels?

What is the cyber responsibility of Boards and C-Levels?

Board members, C-level executives, and even small business owners who think that cybersecurity and compliance are the responsibility of the IT department or an outsourced IT vendor are very much mistaken. Forbes points out that what is considered...
Case Study:  Customized MSSP solution

Case Study: Customized MSSP solution

CASE STUDY:  A technology services provider in the financial sector had been using another MSSP to add security monitoring to the services they offer their clients, but they were having some struggles.  Since many MSSPs rebrand the SIEM tools they use, they...
Cybercrime-as-a-Service

Cybercrime-as-a-Service

One of the reasons cybercrime is so prevelant is that you don’t actually have to be a skilled hacker any more.  There is a whole black market of denial-of-service attacks, ransomware, and exploit kits for sale – with an hour long DDoS attack starting at...
What do you need to know if you transmit or maintain health data?

What do you need to know if you transmit or maintain health data?

Organizations that handle healthcare data need to understand the risks, requirements, and ramifications in order to make prudent decisions on how best to protect it.  Let’s start with the risks. HIMSS published their 2018 healthcare survey and found that most...
SMBs are huge targets for cyber breaches – What can be done?

SMBs are huge targets for cyber breaches – What can be done?

A 2017 Ponemon study confirmed that Small-Medium Businesses (SMBs) are key targets for cyber breaches, mainly due to employee error that allows in malware and ransomware.  What is even more alarming is that the damages are now averaging over $1M, a price few SMBs can...
Are you listening to your Cassandra to avoid cybersecurity disasters?

Are you listening to your Cassandra to avoid cybersecurity disasters?

What is a Cassandra?  In Greek mythology, Cassandra had the gift of prophecy, but was cursed by Apollo that her predictions would always fall on deaf ears.  What does this have to do with cybersecurity?  Many times we see this play out with an organization’s...