Follow Us:

Trusted Information Security Insights

The Importance of Cybersecurity in M&A

Cybersecurity breaches, Privacy & Compliance risk, reputational damage - and the inevitable remediation that will need to be done to address the fall out - will give pause not only to your customers, but also to potential business partners and investors. A strong cybersecurity posture, one ingrained into your company's culture, can reduce risk while acting as an asset which outside investors are increasingly considering as part of M&A evaluations.…

Written by Humberto Gauna

How to instill good security habits: Don't call it training.

Cyber-attacks are on the rise and this is especially true at SMBs. It's important to instill good security habits in your employees but the same old training isn't going to improve your organization's security. It's time to think of security training in a different way - a way that inspires everyone to take cyber security seriously and adopt best practices that will make your business stronger and less vulnerable to cyber-attacks. How can you make this a reality at your organization? Click here to learn more.…

Written by Humberto Gauna

State laws on IoT security: A good start

 …

Written by Matthew Wilson

When security is an inside job.

In many companies, IT and HR don't have much in common. While this is understandable, it can create a gap in communication that can be problematic for an organization's security. Worse, this weakness can be exploited by disgruntled current or former workers to do damage to the organization and expose or steal critical information. Learn more about the risks and how to protect your business by clicking here.  …

Written by Humberto Gauna

Cryptojacking: Should you be concerned?

In some ways, cryptojacking seems like a victimless crime. Hackers steal a bit of computing power from legions of electronic devices – including PCs, network routers and cameras – surreptitiously using it to mine for valuable cryptocurrencies like Bitcoin or Monero. Virtually unheard of five years ago, cryptojacking has exploded, rising 459 percent since 2017, according to the Cyber Threat Alliance. Unlike other types of hacking, cryptojacking isn’t an outright threat. In fact, the hackers hope you never discover it. Better for them to run quietly in the background, using the accumulated compute power to verify transactions on a blockchain, the digital ledger on which cryptocurrencies are created. By solving the cryptographic equations, the hackers earn digital currency. It’s like printing money, only digitally.…

Written by Matthew Wilson

GO BEYOND THE BASICS

Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics