By Chris Cronin Cyber security insurance is rapidly becoming a staple for cyber security risk management. Organizations are increasingly transferring cyber security risk to insurance carriers who will cover costs that result from a cybersecurity breach.
COVID-19 – Social distancing, remote working, telecommuting, staying-at-home – changes to our working environment can expose security vulnerabilities, especially social engineering. Bad actors view our increased digital activities as an opportunity to attack. Remind your teams of your cyber security policies and procedures.
As technologies advance in our fast-paced world, our activities and information are being constantly collected and monitored – so what is ‘privacy’?
HALOCK’s Tod Ferran will be presenting, “The Questions a Judge Will Ask You After a Data Breach” on June 3, 2019 at the Techno Security & Digital Forensics Conference in Myrtle Beach, SC.
Cybersecurity in this day and age is a collective effort. Its also a moving target as attack strategies, exploits and malware strains are constantly changing. To effectively protect users, data and capital investments from the bad guys, we continually enhance security strategies and tools with developing industry trends. For just as attack vectors evolve, […]
NIST Cyber Security Risk Management Conference – Reasonable Risk. Our partner, Chris Cronin will be speaking with Phyllis Lee of the CIS (Center for Internet Security).
Why a Chicago-Based Cyber Security Firm Just Released its Prized IP. By Chris Cronin, ISO 27001 Auditor, Partner
REDUCING RISKS THROUGH COMPENSATION. Has your organization been struggling to achieve its compliance goals? Whether your organization is new to risk management or you’ve been struggling with compliance for some time, making compliance a part of every employee’s compensation plan is a smart strategy. This can get everyone in your organization thinking about information security […]
Author: Chris Cronin, ISO 27001 Auditor Too often in information security we focus on the confidentiality of personal information, ignoring the damage that can result from failures in integrity and availability. In fact, this is the main driver of much of our information security spending in the U.S. But the proper function of information and communications […]
Information security laws and regulations are telling us to conduct risk assessments before we develop our security and compliance programs. They insist on this so our security goals are meaningful to each of us, rather than aspiring to a generic list of controls that were written by experts who never met us and don’t understand […]