Cybersecurity tabletop exercises are a planning technique designed to evaluate an organization’s incident response plan. Tabletop exercises engage Incident Response Team members and help them manage their response to a …
Healthcare Cybersecurity Prognosis
Healthcare organizations face a no-win choice: invest now to protect itself against cyber-attacks, or pay later for the remediation, regulatory fines, and lawsuits that a data breach brings.
Planning a Merger or Acquisition? Cybersecurity is Step One
True story: It’s Monday morning, and today, Company X is going to announce a large acquisition, but as employees arrive to work, they find the company’s systems are locked. Even …
Healthcare Under Cyber-Attack: Prevention is the Best Medicine
The first known fatality resulting from a cyberattack was reported in September 2020. Ransomware hit a hospital in Düsseldorf, Germany, crashed its systems and forced it to turn away emergency …
Think Like a Hacker to Catch Them (If You Can)
The movie “Catch Me If You Can” is a great lesson in thinking like the enemy to protect yourself against them. It is based on the real-life story of a …
A Guide to Phishing Attacks
Phishing is an online scam where cyber criminals send messages that appear legitimate to get the recipient to click a link and enter confidential information. Once a phishing link is …
Black Hat vs. White Hat Hacking
There are many different types of hackers. Some use their powers for good (white hat hackers) while some use their skills for not-so-good (black hat hackers). And then there are …
What Will a Data Breach Cost? 12 Things to Consider
Has your company or organization ever given serious, disciplined thought about what a data breach would cost if it happened to you? Your Chief Financial Officer can probably estimate, down …
What’s the Difference Between Cybersecurity as a Service and Cyber Incident Response?
It’s a question often asked: what is the difference between Cybersecurity as a Service and Incident Response? The short answer is, Cyber as a Service focuses on the planning and …
IT Asset Management and Cybersecurity: Data Soulmates
IT Asset Management is a critical support system for any cybersecurity program – People, processes, and technology working together to create a “single source of truth” about the hardware and …
Cyber Maturity Scorecard
Cybercriminals are always looking to take advantage of gaps in cybersecurity for their own personal gain. Only a disciplined cybersecurity program can help prevent cyber-attacks from happening. How “Cyber Mature” …
Cyber Insurance: What is It, and Do You Need It?
Every day, there are news stories about data breaches and cybercrimes committed against retailers, banks, governments, health systems, universities, and countless other businesses. The breaches and attacks are increasing in …

