Essential Principles Behind ISO 27001: A Guide for Business Leaders

By |2024-09-04T18:47:42-04:00September 4th, 2024|article, Blog Archive, Cyber-Security|

Last year, the average total cost of a data breach in the United States rose well above $9 million. These breaches exposed the personal data of millions of individuals, disrupted business operations, and continue to threaten information integrity. In this dangerous digital wilderness, the principles behind ISO 27001 provide an essential framework for managing sensitive data. ISO 27001 refers to an international standard outlining requirements for an information security management system (ISMS). Rather than merely a technology initiative, the ISMS involves a business-led approach to keeping a company’s information safe and effectively managing risk. Organizations that achieve ISO 27001 certification

Comments Off on Essential Principles Behind ISO 27001: A Guide for Business Leaders

Manufacturing Data Governance Best Practices to Drive Innovation and Productivity

By |2024-01-30T10:21:19-05:00July 6th, 2023|Cyber-Security, Information Governance and Management|

To keep pace in a competitive environment, manufacturers must harness the power of data to improve processes and decision making. However, rapid digital transformation, evolving market demands, and heightened customer expectations introduce unique challenges to manufacturing data governance. Utilizing data governance best practices can help. Unique Manufacturing Data Governance Challenges Like nearly all industries, the manufacturing industry runs on data. Unprecedented quantities of information offer tantalizing opportunities to upgrade processes, spark innovation and improve the customer experience. But with those opportunities come some challenges. Important information hidden in mountains of data – Manufacturing generates huge amounts of data from a

Comments Off on Manufacturing Data Governance Best Practices to Drive Innovation and Productivity

Cloud Data Backup Tips to Protect Essential Business Data

By |2023-04-27T09:59:26-04:00April 12th, 2023|Cyber-Security, Information Governance and Management, Microsoft 365|

As the majority of businesses migrate data to the cloud, many assume they no longer need to back up their data. However, cloud storage does not take the place of data backup. In fact, hybrid work increases the likelihood of cyber attack and data corruption, making it even more important to put a cloud data backup strategy in place. Consider that over one million organizations use Microsoft 365. However, although Microsoft itself suggests using a third-party backup solution, most of these companies do not have a backup system in place. Additionally, most organizations store data in a combination of on

Comments Off on Cloud Data Backup Tips to Protect Essential Business Data

Law Firm Compliance Challenges Underscore Need for Renewed Cyber Security Focus

By |2023-03-07T16:06:13-05:00February 8th, 2023|Cyber-Security, Data Compliance, Information Governance and Management|

Today’s regulatory environment can feel like a minefield. From SOX to HIPAA, GDPR to PCI DSS and new state privacy laws, complex regulations affect nearly every organization. And for attorneys, the landscape proves especially difficult. Each client potentially brings both sensitive data and additional regulations, adding to law firm compliance challenges. Understand How and When Regulations Apply to Law Firms Law firms occupy a unique position that makes them potentially subject to a wide range of regulations. Like any organization, they must comply with the evolving privacy laws of the state(s) in which they do businesses. However, in addition, they

Comments Off on Law Firm Compliance Challenges Underscore Need for Renewed Cyber Security Focus

Cyber Security and Data Governance Best Practices for Today’s Data Environment

By |2022-07-12T14:29:55-04:00June 29th, 2022|Cyber-Security, Information Governance and Management|

A network of hurdles dominates the current data environment. Rapid data growth makes data difficult to manage. Meanwhile, cyber-attacks grow increasingly sophisticated and frequent, while remote work and cloud migration complicate the security landscape. Now, more than ever, cyber security and data governance best practices play a critical role. In 2020, the world generated approximately 2.5 quintillion (that’s 2.5 billion billion) bytes of data. Data analytics hold a world of promise. However, the data comes so quickly and in such volume that organizations struggle to harness its value and keep it safe. Data governance thus becomes a critical priority. Organizations

Comments Off on Cyber Security and Data Governance Best Practices for Today’s Data Environment

Medical Identity Theft – When Your Health Is Their Wealth

By |2020-10-06T05:48:00-04:00August 9th, 2020|Cyber-Security|

Cybercriminals are giving a new meaning to the term ‘Health is Wealth’. Medical identity theft has victimized over 2.2 million people and that number is growing. Although medical identity theft is not something new, the increasing number of data breaches has increased the number of victims. What is Medical Identity Theft? Medical identity theft occurs when someone steals your personal information to get free medical care, medical devices or prescription drugs under your name. This is more dangerous than identity theft because medical identity theft not only ruins your finances, it can have terrible effects on your health. The information

Comments Off on Medical Identity Theft – When Your Health Is Their Wealth

7 Coronavirus related scams targeting your business

By |2020-06-11T13:37:38-04:00May 11th, 2020|Cyber-Security, Safety and Cyber Security|

We’ve warned consumers about Coronavirus related scams, but businesses are at risk, too. Keep your guard up against these seven B2B scams that try to exploit companies’ concerns about COVID-19. In addition to sharing this information with your employees and social networks, read on for how you can report Coronavirus scams to the FTC. Coronavirus related scams: "Public Health" Scams Fraudsters are sending messages that claim to be from the Centers for Disease Control and Prevention (CDC), World Health Organization (WHO), or other public health offices. They may ask for Social Security numbers, tax IDs, etc. Other variations direct you to

Comments Off on 7 Coronavirus related scams targeting your business

COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

By |2020-06-11T13:49:00-04:00April 23rd, 2020|Cyber-Security, Safety and Cyber Security|

Since the COVID-19 pandemic began, cybercrime has increased by up to 300%. According to cyber security experts, a big part of that increase has come in the form of COVID-19 phishing scams. Now more than ever, organizations must remain hyper-vigilant to protect assets and employees from attack. With many employees working from home (WFH), everyone appears to be a target. With expanded security perimeters, reports of phishing attacks are way up, even within our own organization. Current COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the sinister but effective method of spoofing authoritative sources. Often-spoofed organizations include the

Comments Off on COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

Coronavirus Phishing Attacks Target Remote Workers

By |2020-06-12T10:32:00-04:00March 24th, 2020|Cyber-Security, Safety and Cyber Security|

Spurred by social distancing orders, the American workforce is returning home. In fact, Netskope Threat Labs reports that 58 percent of users worked remotely last week. This compares with an average of 27 percent prior to the pandemic. Unfortunately, researchers have also recorded a corresponding spike in coronavirus phishing attacks. Cyber criminals love a crisis, from terror attacks to natural disasters. Using emotional appeals and a sense of urgency, they trick users into surrendering sensitive information or unknowingly downloading malware. And most of the time, they use email to launch the attack. Remote Work Raises the Risk While advances in

Comments Off on Coronavirus Phishing Attacks Target Remote Workers

Advancements in Data Encryption Up the Data Defense Game

By |2024-03-12T16:00:46-04:00March 5th, 2020|Cyber-Security, Data Compliance, Technology|

From credit card transactions to online loan applications and sensitive emails, billions of pieces of valuable information cross the internet every hour. Keeping that data safe from unauthorized access requires increasingly sophisticated tools. As the challenges to data security grow more intense, advancements in data encryption rise to meet them. In the movies, messengers transmitted important documents in a briefcase, handcuffed to the messenger’s wrist and accessible only via a key. The messenger made certain that no one tampered with the document during transit and that only the intended recipient opened the briefcase to retrieve and read its contents. Encryption

Comments Off on Advancements in Data Encryption Up the Data Defense Game
Go to Top