Tag Archives: Cyber security

We Just Gave Away Our Cyber Security Intellectual Property. It was the right thing to do.

Why a Chicago-Based Cyber Security Firm Just Released its Prized IP. By Chris Cronin, ISO 27001 Auditor, Partner

8 Things to Help Make This Year’s Penetration Testing a Success

8 Things to Help Make This Year’s Penetration Testing a Success – From a macro point of view, 2017 was a rough year when it comes to cyber security.  As spring turned into summer last year, we watched the WannaCry and NotPetya malware viruses implement global infestation, creating lost productivity that negatively affected both quarterly earnings […]

PRIVACY VS SECURITY – WHAT’S THE DIFFERENCE?

By Chris Cronin, ISO 27001 Auditor, PartnerThe ever-increasing demands from laws and regulations to protect personal information comes with confusion about what exactly our protection responsibilities are. One source of that confusion is in the use of the terms “privacy” and “security.” While “privacy” and “security” are both common terms used in laws, regulations, and security […]

How to Quickly Respond to Computer Intrusions – HALOCK

By Todd HackeThe moment you realize you are experiencing a network-based breach, you may not know what to do. Minute one, hour one, day one, what should a technical team do to respond to a breach while it’s still in play? While having a full incident response plan, a trained response team, and well-placed log […]

SIX THINGS TECH START-UPS CAN DO TO IMPROVE THEIR SECURITY POSTURE

Author: Terry Kurzynski, ISO 27001 Auditor, CISSP, CISA, PCI QSA The Internet of Things (IOT) and Cloud Computing has provided business and consumers with unimaginable tools and functionality, not to mention immense entrepreneurial opportunities. Along with the connectedness of these solutions comes increased security risks that many entrepreneurs, start-ups, and venture capitalists need to be aware of […]

Security awareness training is more important than ever.

Can’t state it often enough – Cyber security awareness training is more important than ever.  Many of the incidents we respond to are caused by malware being downloaded by users.  Once it’s in your network, it’s only going to propagate.  It’s like a bad roach infestation.