“We’re too Small” is a Terrible Defense against Today’s Cyber Attacks

As more states ratchet up the penalties for data breach notification and remediation, the costs of even small (sub 10,000 record) breaches soar. Even small professional practices often can count several thousand consumer or business records in their systems. Exposing several thousand in a breach and having to offer credit…

Continue Reading “We’re too Small” is a Terrible Defense against Today’s Cyber Attacks

Drop that USB Now and Back Away from the Laptop

"Good News for hackers: People still plug found USB sticks into their Computers", a great example of social engineering by CompTIA.  As it turns out, more than 1 in 6 people will pick up a "found" USB flash drive from a public place and plug it in to see what’s…

Continue Reading Drop that USB Now and Back Away from the Laptop

Launch an Information Security Program for any Size Team – Cybersecurity Tips from the Pros

    In what has become a “tip of the iceberg” wave of security breach reporting, most companies suffer the effects quietly.   Each year we look back on countless examples of large and small companies falling victim to cyber security breaches.   While the largest cases (often with tens…

Continue Reading Launch an Information Security Program for any Size Team – Cybersecurity Tips from the Pros

5 Steps to Find and Eliminate Security Vulnerabilities

It's unavoidable today. Personal computers, smart phones, tablets, and other network and Internet connected devices run software from multiple sources. That’s great and it makes us pretty happy most of the time. We get great software, communicate fluidly and quickly, and work more efficiently. The problem is that software can…

Continue Reading 5 Steps to Find and Eliminate Security Vulnerabilities

You have reached the last post.

No more pages to load