Category Archives: Vulnerability Management
A Summary of DBIR 2020 – Where the Data Breach World is Today and How to Prepare for IT
M&A: The Cyber Risk of Business
The impact of the COVID-19 pandemic is profound – every business has been touched, forcing many to explore how their organizations adapt to the new economy. Some industries have bigger challenges due to the nature of their business – travel and lodging, restaurants, transportation, oil and gas and more due to social distancing ordinances. (more…)
Payment Processing in a Remote Working Environment
Organizations are facing a lot of change with remote work set ups – in both physical location and operational shifts. Especially challenged are businesses that manage credit card information electronically and over the phone. These new working conditions unearth new risks for sensitive data. Social distancing can also bring about more social engineering attempts. According to the U.S. Secret Service, social engineering/phishing is a very common online attack right now.* (more…)
CRITICAL THINKING Processing All the Data
BY Tod Ferran, CISSP, QSA It’s easy during crisis, such as the current Covid 19 pandemic, to drop our critical thinking skills and become overwhelmed with the current events. (more…)
Social Distancing. Social Engineering.
COVID-19 – Social distancing, remote working, telecommuting, staying-at-home – changes to our working environment can expose security vulnerabilities, especially social engineering. Bad actors view our increased digital activities as an opportunity to attack. Remind your teams of your cyber security policies and procedures. (more…)
4 Reasons Why Third-Party Risk Management (TPRM) Should Be Reviewed
As people “Stay at Home” and work remotely during the COVID-19 pandemic, organizations have an increased reliance on external partners, suppliers, and third party vendors to keep their businesses running. For some companies, this may be the first time their employees worked outside of their office, without the benefit of established cyber security policies for working from home. It is crucial that third-party vendors be on the same page as their clients to ensure proper safeguards and business continuity. (more…)
COVID-19 and Staying Cyber Secure
As news of Covid-19 grows in the news, so do cyber attacks, taking advantage of newly-remote workers and the population wanting to learn more of our evolving landscape. Be alert and cautious of unfamiliar emails or calls that disguise themselves as official health organizations you receive or promises of the stimulus package payout. Here are a few recent nefarious cyber security scams that our fellow industry professionals have discovered.
(more…)RSA Conference Speaker Session Securing the Budget
RSAC 2020: Jim Mirochnik presents Securing the Budget You Need! Translating Security Risks to Business Impacts.