Fraud Prevention With Good Cybersecurity Practices

Author(s):

Kayla Matthews, ,

Fraud Concept

Financial fraud cases show up in the headlines regularly. Yet people don’t necessarily connect these cases to cybersecurity. However, it’s often true that good cybersecurity makes a person or company less likely to experience financial fraud. Cybersecurity Starts With Awareness Many scammers who operate online pose as legitimate brands, such as banks or e-commerce companies. … Read more

13 Dangers of Cloud-Hosted Data

Author(s):

Isabell Gaylord, ,

Cloud Computing Security Concept

Organizations are under pressure to either develop new applications or migrate to using cloud-based services. However, like any third-party product being introduced into an organization, there are many risk factors to consider to ensure that the business of the day is carried out securely.  Cloud-based services provide an extra layer of efficiency in the workplace. … Read more

Why You Should Destroy Your Old Cell Phone

Author(s):

Frankie Wallace, ,

Destroying a Cell Phone with a hammer, Cellphone

Today, just about everyone has a cell phone, with expanded mobile options that have heavily influenced culture in countless ways, from fashion to software development. Moreover, it is common to get a new cell phone every couple of years or so, especially if a newer, better model has come out. However, one area that has … Read more

The Importance of Protected Digital Assets

Author(s):

Frankie Wallace, ,

Digital Assets

A significant number of your digital assets, whether personal or professional, are now digital in this current age. The transfer of business practices, records, and even storefronts from a mostly physical world to a digital plain has developed rapidly over the last couple decades. Because of this, we are increasingly concerned about the security of … Read more

How to Recover a Hacked Website

Author(s):

Julia Sowells, ,

Computer with spam bursting out hacked computer

A hacked website is not notable news; it has become an almost common thing. So, what to do if you have a hacked website? How can you work on recovering things and bouncing back? Well, it is not that difficult. Here is a look at some easy steps that will help in the recovery process: Step … Read more

From the Summer 2015 Issue

Playing Both Sides of the Field: An Offensive and Defensive Approach to Cybersecurity

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

In our mobile and ever-changing cyber world, traditional static security solutions are simply not enough to defend against the complex, multi-dimensional threats to digital security. While securing network borders is unquestionably key in maintaining a protected system, all too often organizations ignore the serious threat insiders pose to cybersecurity. Through negligent or malicious means, insiders … Read more

From the Summer 2015 Issue

Strategizing for Data Breach Risk Management

Author(s):

Christine Kinyenje, Founder and Principal Consultant, CKSecurity Solutions

Organizations are struggling to handle data breaches, as their frequency in the news indicates. According to the Ponemon Institute and IBM’s 2014 report on corporate data loss prevention, the average cost of a data breach to a company was $3.5 million – 15 percent more than what it cost in 2013.1  It is evident from the … Read more

From the Summer 2015 Issue

Get Tested: Penetration Testing as an Integral Part of Your Company’s Cybersecurity Plan

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

Cybersecurity is now more than ever a business requirement in every industry.  The 2015 Verizon Data Breach Report estimates 700 million compromised records in all of 2014.1  Worse yet, that number only represents known/reported breaches. A survey of attendees at the 2008 RSA Conference indicated that 89% of breaches they were aware of went unreported.2 If … Read more

From the Summer 2015 Issue

Don’t Become Extinct: The Evolution of Information Security, Part Two

Author(s):

Will Janssen, Business Development Director, Signals Defense

In Part One of this series, the idea of the three waves of security was introduced, with the Physical Security 1st Wave having established the principles and ideas of security used in the next two Waves. The 2nd Wave is “Wired” IT Security, which is maturing with standards, technologies, and operational approaches and is being … Read more