,

Sitting Ducks: Are You Leaving Your Business Open for Attack?

Author(s):

Waqas S, Cybersecurity Journalist, DontSpoof

Business Security - Sitting Ducls

There have been some hugely publicized attacks on big brands over the years – some high-profile cases include the World Health Organization (WHO), Marriott Hotels and, most recently, T-Mobile. There is an alarming increase in the number of daily cyber-attack attempts and business security is top of mind. The question is, why have businesses become … Read more

,

Securing Endpoints: The Gateways to Your Enterprise

Author(s):

Nikhil Narayan, Product Marketer, ManageEngine

Securing Endpoints - Network

Endpoints across an IT network lay the foundation of every modern-day enterprise.  These endpoints, comprising of laptops, desktops, and mobile devices that connect to the business’s network are seen by malicious actors as potential gateways for data breaches and malware intrusions. According to a study released by Quantitative, the average cost of a data breach … Read more

From the Summer 2021 Issue

Top 5 Tips for Small Business Resiliency

Author(s):

Kate Esprit, Cyber Threat Intelligence Analyst, MITRE

Top Five Tips

What can we learn from a cyber-attack in Alaska? Albeit small, they were resilient! In July 2018, the small Alaskan community of Matanuska-Susitna (Mat-Su) was targeted by a ransomware attack, which resulted in more than 700 devices being knocked offline. The incident proliferated through Mat-Su’s local networks, impeding office phone lines and affecting the borough’s … Read more

From the Winter 2014 Issue

Northrop Grumman and bwtech@UMBC Graduate First Three Companies from Innovative Cyber Cync Program

Author(s):

Marynoele Benson, , Northrop Grumman

Small-business initiative generates cutting-edge cyber technologies to meet tomorrow’s global threats  Northrop Grumman Corporation and the University of Maryland, Baltimore County’s Research Park Corporation – also known as bwtech@UMBC – hosted a ceremony this fall for the first graduating class of the Northrop Grumman-sponsored Cyber Cync Program: AccelerEyes, Five Directions and Oculis Labs. The event … Read more

From the Winter 2014 Issue

Homegrown in Harford County, MD – A Technology Base for the Future

Author(s):

Eric Mc Lauchlin, Chairman, Harford County Economic Development Advisory Board

James C. Richardson, Director of Economic Development, Harford County, Maryland

Technology is perhaps one of the most overused terms in today’s society. Everything is “technology-based” or “technologically advanced.” One of the best explanations of technology comes from a definition for young people and refers to its interaction with life, society and the environment. An article at www.getaheadkids.com.au notes that technology must exist “to contribute to … Read more

From the Winter 2014 Issue

BEST PRACTICES FOR SMALL BUSINESS IN CYBERSECURITY FOR 2014

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, MD) It is the time of year for reviewing your business plan for 2014 and making a few updates to improve operations. Your New Year’s Wish List probably includes the government avoiding another shut-down, or sequestration disappearing in 2014, or perhaps that the Pentagon will figure out its budget priorities, or all of … Read more

From the Winter 2014 Issue

Small Businesses: The Challenges of Securing Networks Without an IT Staff

Author(s):

Paul Ihme, , Visionist, Inc.

Small businesses play a vital role in America’s economy, employing more than 50% of the working population1. As a business grows, so does the volume of data critical to its operation. Given this correlation, how does a growing business secure their critical data (client information, personnel records, etc.) without investing overwhelming amounts of money for … Read more