PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

Cybersecurity: Complex but not Complicated

Posted by Jake McGreevy on Aug 11, 2022 1:15:00 PM

The shift to remote work challenged organizations of all sizes to increase their digital footprint and allow everyone to collaborate and work from anywhere in the world to satisfy their customers and clients. For some organizations (usually larger), this is not a problem. However, increasing a digital footprint while keeping security at the forefront can be challenging for medium-sized or smaller companies. The pandemic has fueled an increase in cybercrime, and there are no signs of it slowing down.  

When the pandemic first hit, companies had to transform their businesses quickly, and with that came an increase in security vulnerabilities. It is not crazy to say that most small or medium companies think they are “too small” to be a target, but that is not true. The media likes to spotlight attacks on Fortune 500 companies and make it sound like vulnerabilities and malware are complex issues. This rhetoric makes smaller and medium-sized companies shy away from implementing cybersecurity programs and shift their focus to other business areas.  

The reality is that cybercriminals are organized and can attack anyone at any given moment. If your company has any value at all, you are a target. Attackers know that going after large companies is risky and increases their chances of getting in trouble with law enforcement. Ultimately, all they want are quick and easy paydays, and smaller companies typically are an easier target to hit.  

Read More

Topics: Cybersecurity

How to Prioritize Cybersecurity Before a Recession

Posted by ProCircular Team on Jul 28, 2022 3:08:13 PM

Cybersecurity is one of the main factors to incorporate into your organization’s recession planning. One notorious online cybercriminal group, the Cobalt Cybercrime Gang, has been operating since 2013, completing over 100 heists totaling over EUR 10 billion in losses to the European financial industry. In a time when attackers are highly motivated and financial and reputational losses can have significant effects, it is crucial to have a clear picture and action plan regarding your cybersecurity posture.

With new threats emerging daily, it is essential to identify and address technical and operational risks proactively. Ensuring reliable and uninterrupted function of your operations during an incident means preparing for, protecting against, responding to, and recovering from a cyberattack.

A recession can occur unexpectedly with little to no warning and leave companies vulnerable to opportunistic and persistent threat actors. The two-fold impact of an economic downturn would be that companies reduce spending, often cybersecurity spending, and highly skilled individuals across the globe become desperate for income, possibly turning to “black hat” or malicious hacking. Successful cyberattacks lead to significant financial and reputational losses. Businesses need a mature cybersecurity program that is resilient to today’s complex and often uncertain threat environment.

Read More

Topics: Cybersecurity, vulerability assessment, Penetration Testing, Incident Response, vCISO, Recession

When in doubt, try "Password123" - How I guessed your password

Posted by Mike Hedlund on Dec 10, 2021 2:56:13 PM

During a penetration test, login credentials are a highly sought-after item. While it is common to harvest that information via email scams (phishing attacks), it is not always the most practical or effective tactic to gain unauthorized access. That access, however, still requires a valid set of credentials. This poses a challenge. How does an attacker find valid accounts without social engineering? There are two main options: breached credentials and password spraying.

Read More

Topics: Cybersecurity, Network Security, Data Protection, Personal Data Protection, Security Awareness Training, Passwords, Monitoring

Cybersecurity is a Team Sport: Peter Drucker on Cyber Attacks

Posted by Aaron R. Warner on Oct 11, 2021 10:48:44 AM

When Peter Drucker produced his seminal work, “What Makes an Effective Executive,” in the Harvard Business Review (Drucker, June, 2004), he may not have been writing with cybersecurity in mind. In fact, in 2004, the cybersecurity world had only begun to appear as the many-headed beast it’s become since then. Nonetheless, this text is an excellent guide for executives about incident response and breach management.

Read More

Topics: Cybersecurity, budgeting, security incident handling

Should Your Organization Hire a vCISO?

Posted by ProCircular Team on Jun 1, 2021 10:58:25 AM

Technology is essential to modern business operations, but cybersecurity risks and data exposure threats come with that. Thankfully, a virtual chief information security officer (vCISO) can bring comprehensive strategic and operational leadership to security for companies that can only afford a part-time person in an executive cybersecurity role. Amid today’s industry-wide shortage of skilled security workers, vCISO could be the best option for finding and retaining critical security leadership.

Read More

Topics: Cybersecurity, vCISO

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates