Promising Proposals: 12 RFP Keys

On dating websites, users answer profile questions to help you find the perfect match. What are your hobbies? Where do you like to travel? How do you feel about kids? Pretty standard inquiry to help zero in on someone promising. But when it comes to vetting IT assessment vendors, decision-makers struggle with knowing what to ask about,… Continue reading Promising Proposals: 12 RFP Keys

10 Inclusive Hiring Keys For A More Diverse IT Team

Business management concept. Group of businessperson. Management strategy.

IT security is heading skyward—experts anticipate the global cybersecurity market will increase by $30 billion over the next two years. But while positions in the field are everywhere for tech-savvy applicants, the profession also has a diversity issue: Most of its hires will be white and male. For this profession of securing environments, IT security’s… Continue reading 10 Inclusive Hiring Keys For A More Diverse IT Team

Top Targets: Ransomware’s Favorite Industries

As the western world continues to lead in technology advancements, we see the same with a dark counterpart: ransomware attacks. A report spanning January 2020 to July 2022 indicates half of all globally recognized ransomware attacks aimed at the U.S., with 2,400 cases out of 5,200. While healthcare has been a prolific target for malicious actors, especially over… Continue reading Top Targets: Ransomware’s Favorite Industries

Data Protection Bombshells: Lessons From A Whistleblower

No publicity is bad publicity—until a federal cybersecurity consultant warns of your company’s digital espionage, disinformation campaigns, and willful lack of data protection. All eyes are on Twitter lately, as the social media giant faces allegations of cyber-negligence from their former head of security, Peiter “Mudge” Zatko. For his years and reputation in ethical hacking… Continue reading Data Protection Bombshells: Lessons From A Whistleblower

Risky Business: Vendor Vulnerability Update

Like any relationship, contracting with a third party has its risks. No one knows that better than the organizations whose vendors were hit by major breaches in the first half of this year.  Take the Healthcare sector, for instance. The U.S. Department of Health and Human Services’ HIPAA Breach Reporting Tool reports:   360+ notable breaches already in 2022,… Continue reading Risky Business: Vendor Vulnerability Update

Ransomware Revelations: Stop Attackers In Their Tracks

Ransomware attacks are now occurring every 2 seconds, up from every 14 seconds just three years ago. Not surprisingly, the global cost of ransomware is projected to rise from $20B annually to $265B by 2031.  With ransomware, you’re facing the “hostage situation” of the cybercriminal world. Attacks are designed to make you feel helpless and… Continue reading Ransomware Revelations: Stop Attackers In Their Tracks

Perimeters & Permissions: Zero Trust Grows Up

An ever-expanding digital perimeter.  Vulnerable access privileges.  The ‘success’ of cybercrime.  This recipe has pushed cyber defense to shift faster than ever away from traditionally defined boundaries—both network and human. With business in the cloud, remote offices and workers, the Internet of Things (IoT), mobile and personal devices, and much more, the security landscape has… Continue reading Perimeters & Permissions: Zero Trust Grows Up

Anatomy Of A Phishing Victim

A good phishing scam falls into the category of fastest rising cybercrime methods worldwide. Phishing is wildly “successful” in using its victim’s everyday self against them to fuel digital chaos. Through effective social engineering, many victims are blind to the crime during and even after it’s occurred. What’s particularly perplexing is that traits considered positive… Continue reading Anatomy Of A Phishing Victim

Validating Vendors: Are They Secure?

Across today’s global business landscape, turning to third-party entities to support operations is commonplace. It’s not surprising, then, that 82% of companies today provide high-privilege data access to vendors and suppliers.  Yet vendors are just as vulnerable in the face of fast-escalating cybercrime as anyone, especially when cybercriminals favor third parties as an “in” to… Continue reading Validating Vendors: Are They Secure?

7 Rising Cybercrime Ploys & Protections

Can you teach an old cyber-strategy new tricks? Signs point to yes—as workplaces shift gears to the digital world and attack surfaces expand, IT security tactics are playing catch-up with impressive speed. But old habits die hard for your human workers, and cybercriminals are eager to take advantage. Social engineering, the art of exploiting people… Continue reading 7 Rising Cybercrime Ploys & Protections