cyber security

A Hacker Gets His Money… Then Where Does It Go?

The UK is the second most likely country to be targeted by hackers and financial data is on the top of their target list. In 2018, British Airways was one of the companies who fell victim to a cyber attack and both company and employee data were compromised. No matter small or large, all businesses […]

A Hacker Gets His Money… Then Where Does It Go? Read More »

Does Your Online Compliance Monitoring Puzzle Have the Right Pieces?

Online compliance monitoring is the process of ensuring that all online properties relating to corporate brands are following policies, procedures, and regulations. For companies in a regulated industry, it is a critical risk management practice governed by national and state laws and regulations. When it comes to online compliance monitoring, most businesses focus on their

Does Your Online Compliance Monitoring Puzzle Have the Right Pieces? Read More »

The First 100 Days of the New CISO: Expectations vs. Reality

The situation the new CISO finds on arrival is often different to what they were expecting, but who’s to blame? A painfully recurrent complaint among Chief Information Security Officers (CISO) is the disconnect between what they were promised during the recruitment process, and the actual situation they find upon starting the job. Indeed, it is

The First 100 Days of the New CISO: Expectations vs. Reality Read More »

Tips & Tricks for Cyber Security on Your Next Business Trip

When planning your next business trip, whether domestic or abroad, it is important to keep cyber security in mind. In today’s world, you can’t afford to ignore cyber security practices when traveling. Here are some cyber security tips that you should use when on the move. Don’t Forget to Lock Your Devices Before Traveling When

Tips & Tricks for Cyber Security on Your Next Business Trip Read More »

How to Avoid the “Curse of Firefighting”?

Constant firefighting downgrades the role and the CISO must fight to avoid its gravitational pull With regards to many other C-level roles, the Chief Information Security Officer (CISO) position is a fairly recent creation for many organisations. Although it started to emerge over 15 years ago, it has been spurred further recently by growing concerns

How to Avoid the “Curse of Firefighting”? Read More »

Targeting Phishing Attacks: Security Best Practices to Protect Your Business

By Mike Petsalis Email gets a bad rap. It’s treated as a cumbersome messaging system that was invented to work on the system that came before the internet, and has been rumored to be “dead” or dying for years now. Yet, it is still used extensively wherever communication is necessary for normal business operations. Its openness

Targeting Phishing Attacks: Security Best Practices to Protect Your Business Read More »

The “Three Lines of Defense” Model Only Works On Trust

A “people” perspective on GRC models It is no big secret that the “Three Lines of Defence” model underpinning many GRC practices in large firms is poorly understood and poorly applied at grass-root levels. Anecdotal evidence we observe in the field every day suggests that many organisations operate it in a variety of hybrid fashions

The “Three Lines of Defense” Model Only Works On Trust Read More »

With an Increase in Online Shopping, Prepare for an Increase in Data Breaches

If you don’t think that online shopping will soon become as common as shopping at a brick-and-mortar store, you haven’t been paying attention. E-commerce has grown to the point where just about every business has a website and something you can purchase from them online. If your store doesn’t have an online presence, you are

With an Increase in Online Shopping, Prepare for an Increase in Data Breaches Read More »

4 Ways Small Businesses Can Improve Cybersecurity

If you’re a small business owner who thinks that you don’t need to worry about about cyber security, think again. The Ponemon Institute’s 2016 State of SMB Cybersecurity report surveyed 600 small businesses, finding not only that “no business is immune to a cyber attack or data breach,” but that a surprisingly high number of

4 Ways Small Businesses Can Improve Cybersecurity Read More »

?
WP Twitter Auto Publish Powered By : XYZScripts.com