We often spend time with CEOs and board members of various companies, in verticals such as healthcare, finance, transportation, and education.
Topics: Cybersecurity, Data Breach, Data Protection, budgeting
Rolling the Dice on Cybersecurity: Lessons from the MGM Breach
You may have seen it in the news, but another major company has been a victim of a nasty ransomware attack that disrupted services and customers for over ten days. This time, the victim was MGM Resorts in Las Vegas.
What separates this major incident from others is that the hackers pulled the malicious attack off using one of the oldest tricks in the book: social engineering. So, what happened, and what can we learn from this?
Topics: Cybersecurity, Network Security, Data Breach, Data Security, security incident handling, risk, Ransomware, social engineering
6 Benefits of Conducting a Cybersecurity Risk Assessment
With so much of the world's business taking place online, cybersecurity threats have become increasingly prevalent. Cyberattacks cost companies millions of dollars a year, and not every business can recover from an incident like a data breach or ransomware hoax. A cybersecurity risk assessment evaluates how potential weaknesses could impact your organization.
Topics: Cybersecurity, Network Security, Risk Assessment
6 Reasons Your Company Should Invest in Cybersecurity
Business gets more digital every day. Your business likely has an online presence and sensitive data. Companies often have to innovate and embrace new technologies to stay ahead of the competition, and while this innovation is exciting, it also comes with some risks.
Topics: Cybersecurity
No, Your IT Team Shouldn’t Manage Your Cybersecurity
If you were going to test the fault-points of a building, you wouldn’t hire the architect, you’d hire a demolitions expert. Similarly, you don’t want the designer of your network testing its security. If the team that configures your network does so incorrectly, they are most likely unaware. The creator of the environment has an inherent bias based on the angle from which they view it. They are blind to vulnerabilities, not necessarily because they are under-qualified, but because they are too close to the project. A security team has a “black box perspective”, which means they have the same outside view of the system that an attacker would. This outsider point of view is just one of the advantages a security expert has over an internal IT team. They also have the training, experience, time, and resources that would be impossible to lump in with a standard IT program.
Topics: Cybersecurity, Network Security, Information Security, Data Security, Data Ownership, Incident Response, cybersecurity plan