Cybersecurity: Not Just for Techies Anymore
2024 Executive's Guide to Cybersecurity Preparedness
Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training
How things stand: a cybersecurity recap of 2019
Topics: Cybersecurity, Network Security, Information Security, Vulnerability Assessment, Penetration Testing, Incident Response, it risk assessment
The reason we wear our seat belts is not to avoid getting a ticket from the police, but rather to avoid a potential injury in a car accident. This analogy is an easy way to describe the difference between box-checking security and real security, and it's instantly understood regardless of technical knowledge. This message resonates with executives, because they typically prefer to “get to the point” and correctly protecting their data is “the point” of cybersecurity.
Topics: HIPAA, Information Security, consumer security, Data Security, Data Protection, Vulnerability Assessment, it risk assessment, DFARS, cybersecurity plan, NIST
Protecting the Kinds of Data Targeted by Today’s Cyberattacks
Having the right technology should be part of your cybersecurity strategy – but it’s not the only part (and maybe not even the most important part). As an organization’s most valuable asset, investing in people to improve cybersecurity can provide a line of defense that’s tough to find from software or technology.
More than 200 IT and technology leaders from hospitals, schools, and businesses in eastern Iowa came together last month at the Business Technology Conference in Coralville, Iowa – hosted by systems integration firm CEC (Communications Engineering Company) – to learn about new technology and how it can improve processes, profit, and efficiency.
Many types of technology were showcased at the event, but there were plenty of conversations about cybersecurity.
Topics: Cybersecurity, Data Breach, Vulnerability Assessment, Business Technology Conference