Jan 11, 2020 | Access Controls, Amazon, Apple, Asset Management, Attack Vectors, audit logs, Backup, Big Tech, Business, Computers, Cyber breaches, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Employee Training, Employment, Encryption, Fines and Penalties, Google, Hacking, Incident Response, industrial espionage, Insider Threat, Internet, Jobs, Legal, Liability, Malware, Malware, Microsoft, Monitoring, Networking, predictive algorithms, Radio Show, Radio_Show, Ransomware, Security, Software As A Service, Surveillance, Technology, Zero-Day
How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...
Jan 11, 2020 | Access Controls, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Business, Compliance, Computers, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Hackers, Hacking, Incident Response, Intellectual Property Theft, Malware, Patching, Security, Security Alerts, Third - Party, Updates
Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...
Jan 11, 2020 | Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Backup, Business, CEO, Cloud, Cloud Provide, Cloud Vendors, Compliance, Computers, Cyber breaches, Cyber Insurance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data, Data Assets, data sharing, Data Storage, Databases, Employees, Fines and Penalties, Government, Hacking, Hacking, Incident Response, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Machine Learning, Malware, Managed Security Services Provider (MSSP), Microsoft, Networking, Operating Systems, Patching, predictive algorithms, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates, Vulnerabilities
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Jan 11, 2020 | Amazon, anonymity, Apple, Applications, Asset Management, Audit Logs, audit logs, Big Tech, Big Tech, Business, CCPA, Chrome Browser, Compliance, Computers, Cyber Liability, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Encryption, Financial, Fines and Penalties, Google, Government, Hacking, Internet, Legislation, Malware, Microsoft, Monitoring, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, spying, Technology, Updates, Windows (Microsoft)
Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored? California’s...
Dec 19, 2019 | Backup, Business, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, Data Storage, Fines and Penalties, Government, Hacking, Hacking, hacking as a service, Hacks, Incident Response, Insider Threat, Internet, Malware, Networking, Patching, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Are You At Risk from Your Outsourced Software Provider The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...
Nov 30, 2019 | Business, Data, Data Storage, Incident Response, Internet, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, Technology, Vulnerabilities
Upping your Incident Response Game — New Regulations coming If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...