How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...

Cloud Migration Considerations to Take into Account

Cloud Migration Considerations to Take into Account ​ Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Are You At Risk from Your Outsourced Software Provider

Are You At Risk from Your Outsourced Software Provider

Are You At Risk from Your Outsourced Software Provider   The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...
Upping your Incident Response Game — New Regulations coming

Upping your Incident Response Game — New Regulations coming

Upping your Incident Response Game — New Regulations coming   If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...