Should Retailers Purchase Cyber Insurance to Mitigate Ransomware Risk?

By |2022-02-23T15:08:29-05:00January 19th, 2022|Cyber-Security, Safety and Cyber Security|

According to a recent report, 44 percent of retail organizations suffered ransomware attacks in 2020. And attacks increased in 2021. With the average cost of a single ransomware attack reaching nearly $2 million, many retail businesses have looked to cyber insurance to offset the risk. But the choice of whether or not to purchase cyber insurance requires careful consideration. As the threat landscape changes, insurance companies have also had to change their approach. Cyber insurance can prove costly. And it does not prevent attacks, merely helps recovery. In fact, some experts warn that purchasing this type of insurance can even

Comments Off on Should Retailers Purchase Cyber Insurance to Mitigate Ransomware Risk?

4 Best Practices for Secure Collaboration in Municipalities

By |2021-12-06T05:53:51-05:00November 10th, 2021|Cyber-Security|

Like many other industries in recent years, the public sector has witnessed a rise in hybrid work. With team members working in multiple offices, including remotely, government agencies must take a closer look at tools, policies, and processes. The following best practices for secure collaboration in municipalities will help you find the balance between productivity and security. Challenges to Secure Collaboration in Municipalities As employees collaborate with others both inside the agency and externally, government agencies encounter several key challenges. The rise of cloud computing has made collaborating across distance vastly easier. However, at the same time, doing so securely

Comments Off on 4 Best Practices for Secure Collaboration in Municipalities

Exchange Server Breaches Show It’s Not Just About Uptime

By |2022-01-26T15:52:52-05:00October 27th, 2021|Cyber-Security, Email Management Tips|

Early in March 2021, Microsoft announced they had found vulnerabilities that affected their on-premises email platforms. Hackers exploited these vulnerabilities with a series of Exchange Server breaches that have affected hundreds of thousands of organizations. With elevated access, hackers gained the ability to steal data, compromise credentials and plant malware. Since discovering the vulnerabilities in March, Microsoft has released several security patches. However, in a statement released in May, Microsoft indicated that the initial patches alone would not fully protect their customers. If hackers had already compromised the system before the patch, victims would need to take additional steps to

Comments Off on Exchange Server Breaches Show It’s Not Just About Uptime

Regular Data Backup in Microsoft 365 Ensures Business Continuity

By |2022-01-28T09:07:59-05:00September 22nd, 2021|Cyber-Security, Data Compliance, Office 365 and Migration|

Business continuity experts have long emphasized the need for regular backups. With backups, organizations can more smoothly navigate disasters and cyber threats, prevent data loss, and strengthen regulatory compliance. While cloud migration changes the environment, data backup in Microsoft 365 proves essential for business success. Causes of Data Loss Cloud computing delivers anytime/anywhere access to data. Even if a disaster destroys the office, employees can still access critical data from remote locations. However, data loss presents a significant risk, even in the cloud. For instance, the most common cause of data loss involves employees accidentally deleting critical information. Likewise, an

Comments Off on Regular Data Backup in Microsoft 365 Ensures Business Continuity

Addressing the Translation Problem in Compliance

By |2021-10-25T05:46:55-04:00August 11th, 2021|Cyber-Security, Data Compliance|

A traveler walking through the streets of New York City could hear nearly 800 different languages. In fact, 45 percent of New Yorkers speak a language other than English at home. For businesses serving these populations, and for global organizations everywhere, translation services fill a vital role. But businesses must also address the translation problem in compliance. For example, HIPAA regulations mandate that organizations maintain confidentiality of protected health information (PHI). This means that they must protect PHI from unauthorized access at all stages, including in transit and in storage. That includes data being translated. Penalties for violating HIPAA regulations

Comments Off on Addressing the Translation Problem in Compliance

Practical Email Security Tips to Protect Valuable Business Data

By |2021-08-17T02:09:04-04:00August 4th, 2021|Cyber-Security, Email Policy|

A 2020 study reported that 306 billion emails were sent/received worldwide per day. An increasing number of those represent threats to valuable business data. Consider these practical email security tips as part of a multi-layered email security approach with the potential to save both you and your company a lot of time, embarrassment, and money. With over half the world population using email, security professionals work diligently to thwart attacks while cyber-criminals increase in sophistication. However, email remains one of the primary attack vectors of cyber-criminals and a key area of vulnerability, hence the tips. 1. Separate Business and Personal

Comments Off on Practical Email Security Tips to Protect Valuable Business Data

7 Best Practices to Protect Your Phone from Hackers

By |2022-02-17T15:17:53-05:00July 21st, 2021|Cyber-Security, Information Governance and Management, Safety and Cyber Security|

The phone in your pocket can prove both one of your biggest assets and one of your biggest liabilities. Think of the worlds a thief can enter through your mobile phone. They can access your finances, your precise location, your contacts, sensitive business and health documents, and much more. The following tips will help you protect your phone from hackers. Hackers can access your phone directly or through iCloud. Or, using minimal, easily discovered, personal information, they can monitor your communications and location or even hijack your phone. By using a combination of technology and common sense, users can keep

Comments Off on 7 Best Practices to Protect Your Phone from Hackers

Link Data Governance and Cybersecurity to Protect Valuable Data Assets

By |2022-02-17T14:59:37-05:00June 23rd, 2021|Cyber-Security, Data Compliance, Information Governance and Management|

In today’s business environment, data ranks near the top of the list of most valuable assets. It drives development strategy, focuses marketing efforts, and even saves lives. Cyber criminals know well the value of data and its power to make or break an organization. Consequently, organizations must link data governance and cybersecurity to stay ahead of the game. Data Governance and Cybersecurity Defined Think of data governance and cybersecurity as overlapping circles. Though distinct concepts, they share common goals and depend on each other. Data governance involves an organization knowing what data it owns, where that data lives and who

Comments Off on Link Data Governance and Cybersecurity to Protect Valuable Data Assets

When Common Authentication Methods Fail to Protect Your Identity

By |2024-03-12T16:18:31-04:00June 9th, 2021|Cyber-Security, Safety and Cyber Security|

Recently published identity theft statistics paint a sobering picture. For instance, in the United States, identity theft rates have climbed twice as high as the global average. Every two seconds sees a new victim of identity theft, and standard authentication methods may not provide enough protection. No One Immune to Identity Theft Despite vigilant security habits, a small business owner recently discovered that thieves had stolen his identity. He enrolled in LifeLock but continued to experience problems that even interrupted his ability to do business effectively. Finally, he realized that the thieves had hijacked his smartphone. As a result, authentication

Comments Off on When Common Authentication Methods Fail to Protect Your Identity

Bridging the Cybersecurity Skills Gap Safeguards Critical Assets

By |2021-04-19T06:12:56-04:00April 12th, 2021|Cyber-Security|

In 2019, major news outlets reported the prediction that 3.5 million cybersecurity jobs would be left unfilled by 2021. And then the pandemic hit, throwing another wrench in the rapidly evolving threat landscape. To protect vital data assets, companies need to act quickly and decisively to address the cybersecurity skills gap within their organizations. As 2021 moves into the second quarter, we see that prediction being fulfilled. While the skills gap brings career opportunities for trained security professionals, it spells danger for organizations across the globe. Without effective cybersecurity, companies put critical data and processes at risk. Contributing Factors that

Comments Off on Bridging the Cybersecurity Skills Gap Safeguards Critical Assets
Go to Top