True story: It’s Monday morning, and today, Company X is going to announce a large acquisition, but as employees arrive to work, they find the company’s systems are locked. Even …
Healthcare Under Cyber-Attack: Prevention is the Best Medicine
The first known fatality resulting from a cyberattack was reported in September 2020. Ransomware hit a hospital in Düsseldorf, Germany, crashed its systems and forced it to turn away emergency …
Think Like a Hacker to Catch Them (If You Can)
The movie “Catch Me If You Can” is a great lesson in thinking like the enemy to protect yourself against them. It is based on the real-life story of a …
A Guide to Phishing Attacks
Phishing is an online scam where cyber criminals send messages that appear legitimate to get the recipient to click a link and enter confidential information. Once a phishing link is …
What Will a Data Breach Cost? 12 Things to Consider
Has your company or organization ever given serious, disciplined thought about what a data breach would cost if it happened to you? Your Chief Financial Officer can probably estimate, down …
What’s the Difference Between Cybersecurity as a Service and Cyber Incident Response?
It’s a question often asked: what is the difference between Cybersecurity as a Service and Incident Response? The short answer is, Cyber as a Service focuses on the planning and …
IT Asset Management and Cybersecurity: Data Soulmates
IT Asset Management is a critical support system for any cybersecurity program – People, processes, and technology working together to create a “single source of truth” about the hardware and …
Cyber Insurance: What is It, and Do You Need It?
Every day, there are news stories about data breaches and cybercrimes committed against retailers, banks, governments, health systems, universities, and countless other businesses. The breaches and attacks are increasing in …
The Sixth Ocean: The Age of Threat Intelligence
BY CHUCK MACKEY, SENIOR SECURITY CONSULTANT, MCPc The idea of a sixth ocean came to me from an InfoSec associate, Chris Roberts, White Hat Hacker and Researcher. He contends that …