THOSE DAMN USERS!
Everyone in IT knows that all the problems we deal with is because of the users. I’ve heard many times, “My job would be so much easier if it wasn’t for those damn users!” While it is true they cause...
View ArticleCyber Insurance Policies: Are They Worth the Cost?
As organizations accumulate, maintain and store an ever increasing amount of personal, financial and healthcare data, opportunities for attackers to carry out data breaches has increased significantly....
View ArticleUps And Downs
Heartbleed, Shellshock, BEAST, POODLE, DROWN, Badlock; These vulnerabilities have received names due to their “supposed” level of impact. However, are these named vulnerabilities severe and do they...
View ArticleSecurity Breach – Toxic Waste of the Information Age
Information security is still in its infancy as companies scramble to put together competent teams to defend against the growing threat of a security breach. In a way, companies find themselves at a...
View ArticleHow Valuable Is Asset Identification & Management?
As a long time veteran of the I.T. industry and as a security consultant I’m continually surprised at how difficult it is for businesses to create and maintain a well-documented asset inventory. A...
View ArticleCyber Payment Fraud: A Layered Security Approach
When it comes to preventing cyber payment fraud, traditional security controls are proving to be insufficient. Cyber criminals are becoming more sophisticated. Three decades ago, paper check fraud...
View ArticleRansomware: Prevention Now Will Save Panic Later
Your organization has just made a startling discovery. They have been the victim of a ransomware attack and are now facing the challenge of what to do about it. Moreover, you discover that your...
View ArticleCompanies Struggling with Network Security Monitoring
Earlier this year a report released by the Ponemon Institute indicated that four out of five businesses lack the required infrastructure and/or security resources with the proper skills required to...
View ArticleWhat I have learned in my first year of Cyber Security: Part Two- Projects &...
I hope everyone that had a chance to read my part one blog enjoyed it and gained a little extra knowledge. As I mentioned, part two is going to be focused on the difference between projects and...
View ArticleAsset Identification and Valuation
When discussing security and security strategy with clients the topic of risk is usually not far behind. There is always lots of discussion about risk methodologies, annualized loss expectancy (A.L.E.)...
View Article
More Pages to Explore .....