Cybersecurity

Organizational Resilience Starts with Cyber Resilience

There are some events that are nearly impossible to predict or plan for, such as the recent pandemic, and they create challenges that impact organizations and their management. From employee and customer satisfaction to financial difficulties, supply chain disruption and skyrocketing cyberattacks, as a business...


Why You Should Welcome an Outside Security Review

More than once over the years, we have been retained to perform a security review and encountered reluctance on the part of technology staff or the manager of a particular department. In one case when I started the interview with the CIO for a HIPAA...


Print Nightmare?

Yet another “Surprise” security hole with no current patch or fix.  A new vulnerability has come to light targeting the Print Spooler services on all Windows based computers. This vulnerability dubbed “Print Nightmare” is already known to hackers, which means if they can get...


Basic Cybersecurity Controls You Should Already Have in Place

Week after week massive data breaches remind us that pretty much all of our previous passwords are in the hands of cybercriminals.  Ransomware continues to be on the rise with new twists and tools and cybercriminals are constantly looking for new ways to monetize...


Are Hackers Living in Your Network? (Why Monitoring Security Inside Your Network Matters)

Hackers could be "living" inside of your network right now. This sounds paranoid and delusional, but it is absolutely true of every network on the planet. How did they get in? • Phishing emails: Someone clicked a link or opened an attachment....


The Cybersecurity Roadmap

Effective cybersecurity defense is a journey. Do you have a roadmap for your journey? The reason that most compliance requirements focus on some type of documented plan is that it is a fundamental way to lower your risk.