The Impact of the New Data Security Law for Insurance Providers

As of May 1, 2019, Alabama became the latest state to sign into law heightened standards within the insurance industry for cybersecurity and data privacy. The new Law implements an exhaustive set of requirements for data security pertaining to entities or individuals licensed through the Department of Insurance. Both persons and institutions have one year—until [...]

Understanding the Benefits of Engaging in a NIST CSF Assessment

A cyber breach can have potentially devastating effects on a company. It can erode public trust, cause millions of dollars in losses, and even lead to fines and lawsuits. In order to help organizations improve cybersecurity, the National Institute of Standards and Technology (NIST) released its Cybersecurity Framework (CSF), which provides several guidelines related to [...]

2019-08-15T22:07:26-05:00August 15th, 2019|CYBERSECURITY, NIST|

Are You Considering a NIST CSF Assessment for Your Organization?

In February of 2013, Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” was introduced as a means of sharing cybersecurity threat information. The goal was to build a framework around standardized security for the United States to reduce potential risks to critical infrastructure. One year later, the National Institute of Standards and Technology released version 1.0 [...]

2019-05-29T10:51:28-05:00May 6th, 2019|CYBERSECURITY, NIST|

Develop a Nonprofit Cybersecurity Defense for Your Organization

Many consumers have been impacted by the cyberattacks against Target and/or Equifax. In the case of Target, cyber criminals installed sophisticated malware that captured customer data including debit and credit card information. As for Equifax, the personal information of 147 million Americans was exposed in a 2017 data breach—personal information that included names, Social Security [...]

2019-12-27T12:26:50-06:00March 15th, 2019|NOT-FOR-PROFITS|

4 Steps to Assess Your Cybersecurity Risk

Do you know where an attacker could break through your company’s cyber defenses? Chances are, there are more points of vulnerability than you realize, and the stakes are high to protect what’s important. Customers, employees, regulators, boards of directors, and many other stakeholders hold businesses accountable for securing sensitive data. Customers in certain highly regulated [...]

2019-03-19T10:01:56-05:00September 20th, 2018|CYBERSECURITY|

Start From the T.O.P Down: Ways You Can Improve Your Organization’s Cybersecurity

Until the last couple of years, data breaches seemed to be the domain of major corporations—Target, Home Depot, Sony, JP Morgan. However, in recent years, as businesses of every size become increasingly reliant on data and information systems, it is becoming clear that no business is too small to be a target. And yet, only [...]

2019-02-15T11:40:37-06:00May 24th, 2018|CYBERSECURITY|

Will Your Cybersecurity Defense System Protect Your Organization?

For a homeowner, the knowledge that a trained eye has evaluated the home security system — and attested that it is in good working order — can go a long way toward a good night’s sleep. The same goes for business owners and executives in charge of keeping the company’s digital assets safe. Recent global [...]

2018-11-12T15:42:56-06:00March 12th, 2018|CYBERSECURITY|

Protecting Your Company Against Executive Impersonation Fraud

A company’s employees are generally expected to strive to protect the organization from a cybersecurity breach. Yet, thousands of team members unknowingly allow imposters to infiltrate businesses and steal millions of dollars by falling victim to executive impersonation fraud. Surveying the Landscape A variant of business email compromise (BEC), executive impersonation fraud entails a skilled [...]

2021-05-26T15:15:48-05:00March 27th, 2017|CYBERSECURITY, MARCH 2017, May 2017|

You Just Rolled Cybersecurity Attack Snake Eyes. Now What?

In the game of cybersecurity, betting the farm on an ironclad perimeter defense is a losing strategy. “There is a good chance that hackers are already in your system,” a privacy attorney recently told Data Breach Today. “Your focus should turn to not only protecting your perimeter but also identifying hackers within your network and [...]

2018-11-12T15:47:37-06:00July 26th, 2016|CYBERSECURITY, JUNE 2016|

How to Become the Boss of Your Digital Assets

Cybersecurity is a high-stakes game. Understanding the key differences between various types of cyber information is critical to a strong information security program. After all, we protect what is important to us. Organizations that take the time to understand the value of the digital assets they are protecting are more likely to leave the table as [...]

2018-12-17T12:52:55-06:00April 11th, 2016|CYBERSECURITY|

Whaling Cyberattacks: What You Need to Know

Cyberattacks are here to stay—partially because the financial result is lucrative for the criminal and partly because the bad guys can easily hide from law enforcement. It seems to have started with three common types (one of which that has morphed) and have taken off in the below order: phishing*, which includes blast emails designed [...]

2018-11-12T15:49:31-06:00February 2nd, 2016|CYBERSECURITY, FEBRUARY 2016|

Guarding the Data Vault: How to Reinforce a Cybersecurity Employee Culture

As phishing and other social engineering scams become more commonplace and sophisticated, the human factor often is the weakest brick in the walls of a company’s information security. Consider this statistic from a recent cybersecurity study: The average employee will click on one out of every 25 malicious messages. A layered strategy that includes firewalls, [...]

2018-11-12T15:50:39-06:00December 1st, 2015|CYBERSECURITY, DECEMBER 2015|

Winning the Cybersecurity Strategy Game: 3 Steps for Shifting the Odds in Your Organization’s Favor

When whales like Target, JP Morgan, and Anthem turn up losing hands in the cybersecurity strategy game, what chance do lightweights have? To owners and executives in small and mid-sized organizations, cybersecurity can feel like a game of chance—one where cyber thieves are holding all of the cards. On the other hand, some might mistakenly believe [...]

2018-11-12T15:51:08-06:00August 30th, 2015|CYBERSECURITY|

Evolving Risk to States and Other Governmental Entities Regarding Data Breaches

While the expansion of technology—especially the Internet—delivers many benefits, it also produces risks and threats to both individuals and organizations. One of those threats is cyber security, where criminals use technology, stealth, and cunning to rob others. One popular crime among cybercriminals is identity (ID) theft, which has become rampant with costs totaling millions each [...]

2018-11-12T15:55:45-06:00November 8th, 2012|GOVERNMENTS|