Cyber Security Archive
Your company has just been hacked. Awaiting you is hundreds of hours of work putting your network back together, investigating the damage, and dealing with affected customers. After all that, you may well have to defend a multimillion-dollar lawsuit. Now …
The world is more reliant on technology than ever. We spend much of our lives online, and whenever we hand over our personal information, we are at risk of a breach. Although data security is important everywhere, it’s especially so …
ISO 27001 is an ideal resource for organizations looking to bolster their data protection practices and mitigate the risk of cyber attacks. The information security standard contains a framework for implementing an ISMS (information security management system) to ensure the …
There is a common perception – one that’s especially popular among leaders and politicians – that the way to solve a problem is to pass a law. In the U.S., cybersecurity is a particular issue, and one the government has …
A new version of the information security management system ISO 27001 has been published, introducing significant changes in the way organizations are expected to protect their sensitive data. ISO 27001:2022 marks the first major changes to the Standard in almost a …
Your organization prioritizes cybersecurity – and for good reason. A security incident can cause significant damage, and if it isn’t properly addressed, the disruption can hamper business productivity and hurt your bottom line. Although your organization has no doubt done …
A data breach is a type of security incident that leads to the accidental or unlawful destruction, loss, alteration, authorized disclosure of, or access to, sensitive information. These incidents occur when personal information is mishandled, whether through malicious intent, carelessness, …
Organizations are being warned with increasing urgency about the threat of cyber attacks. There are regular news stories of companies leaking sensitive information, receiving multi-million dollar fines, and halting production after being infected with malware. But what exactly is a …
Security threats are ever-changing. Digital transformations have exposed us to a never-ending stream of new technologies, business models, and cybersecurity risks. Many organizations struggle to keep up with the latest security threats, let alone anticipate them. Changing the way we …
Third-party risk management focuses on identifying and reducing risks relating to vendors, suppliers, partners, contractors, and service providers. It has become more important than ever due to the growing trend in third-party data breaches. Incidents such as the SolarWinds hack …