Feb 02, 2021 4 min read
How Remote Working Introduces Additional Third-Party Risk
When the coronavirus first reared its ugly head, we didn’t truly understand the implications it would have on our lives and on our businesses. But by March 2020 it was pretty clear that the implications would be huge, beginning with businesses moving their entire operations to remote locations, ostensibly overnight. This sudden transition from in-company to remote working presented a...
Oct 06, 2020 3 min read
Securing Your Suppliers: Preventing Phishing Attacks
Phishing, which is an attempt to deceive a victim so as to gain access to confidential information and/or distribute infected files, is nothing new. But it’s gotten worse. According to the Verizon Business 2020 Data Breach Investigations Report, phishing was to blame for more than 67% of breaches—but that was before coronavirus. In March, phishing attacks rose 667%, and research...
May 21, 2020 3 min read
How to Achieve Cyber Resilience in 4 Steps
Cyber resilience is the ability to prepare for, respond to and recover from cyberattacks. This can include a set of policies and procedures that will help mitigate risk during normal operations within the processes and workflows of an organization. An organization with true cyber resilience can quickly get back to business as usual following any incident that is out of...
Mar 09, 2020 3 min read
Service Announcement: The Right Questions to Ask Your Vendors in Times of…
In the wake of coronavirus, companies are now applying immediate work-from-home policies. This sudden and massive change poses a set of new cybersecurity risks and is forcing security teams to take immediate action. One of these cybersecurity risks emanates from the supply chain. While a large company may be able to quickly undergo the transition from a relatively concentrated workforce...
Jan 30, 2020 3 min read
Touchdown! Measuring External Cyber Posture and the NFL Hack
This week, sports fans reacted with disbelief when it was discovered that 15 NFL teams’ social media accounts were hacked. Those targeted included the two teams that will play in the Super Bowl LIV Championship match on February 2, the Kansas City Chiefs and the San Francisco 49ers. (more…)
Jul 02, 2019 3 min read
Expert Advice: How to Avoid Misconfigured Servers
Lately, we’ve seen a lot of news reports about databases inadvertently being exposed on the internet as a result of servers that are not configured correctly. This exposed data can include private information such as insurance records, photos or even veteran combat injuries. (more…)
Nov 26, 2019 3 min read
3 Key Points About CCPA
What is CCPA? The California Consumer Privacy Act (AB 375), which will go into effect on January 1, 2020, is expected to significantly strengthen data collection and privacy in the USA. Similar to the way the General Data Protection Regulation (GDPR) defined data privacy in Europe, the CCPA regulation is expected to set the standard for data privacy in...
May 08, 2019 3 min read
3 Reasons Why Enterprises Hate Security Questionnaires
It’s not hard to understand why security questionnaires are necessary. Because regulations like GDPR and NYDFS are holding businesses accountable for their third parties’ cybersecurity, it’s important for enterprises to assess and continuously monitor all vendors, suppliers and business partners. And the initial vetting of any third parties typically begins with a comprehensive security questionnaire to evaluate cyber posture. (more…)