“What are the top 7 things you can do to protect your business from hackers?” Have you ever read a list like that on the internet? In the cybersecurity realm, they’re everywhere. I’ve even assembled and presented one of those lists to a group of business owners myself. They tend to point out things like user awareness training, patching and passwords. All noble things to get your arms around, of course, but are they useful to a client? Sometimes I feel as though those lists, as true as they are, are about as useful as telling a football team to “score touchdowns”, or “guard the quarterback.” Yeah, I know that scoring touchdowns is good… but how?
Topics: Cybersecurity, HIPAA, DDOS, it risk assessment, cybersecurity plan, NIST
Everyone has (or should have) an anti-virus solution. It's probably barked at you once or twice for downloading a file from a sketchy website or opening a link from an email you didn't quite recognize. But how does your anti-virus know what programs are bad, and what programs are good?
Topics: Cybersecurity, Information Security, Incident Rsponse, security incident handling, security incident response, cybersecurity plan, SIEM
More than 200 IT and technology leaders from hospitals, schools, and businesses in eastern Iowa came together last month at the Business Technology Conference in Coralville, Iowa – hosted by systems integration firm CEC (Communications Engineering Company) – to learn about new technology and how it can improve processes, profit, and efficiency.
Many types of technology were showcased at the event, but there were plenty of conversations about cybersecurity.
Topics: Cybersecurity, Data Breach, Vulnerability Assessment, Business Technology Conference
Cybersecurity: What All Companies Need to Think About
There’s something powerful about bringing a roomful of Iowa technology professionals together to talk about forward-thinking ideas. You quickly realize how cybersecurity and data breaches truly impact every organization and everyone – and that no organization is ever too small to have a plan.
Topics: Cybersecurity, Data Breach, Iowa Tech Summit, Quantum Computing, Digital Rights Management
Information Security Costs: Budgeting for Cybersecurity
Budget season is upon us. Are you using this time to establish or improve your cybersecurity strategy?
Topics: Cybersecurity, budgeting