April 25, 2022

3 Vendor Risk Management challenges and how to solve them

[5 min read] Vendor Risk management is a hot topic especially when you realize that many of the most high-profile data breaches are due to vendors or...
Read more
April 5, 2022

3 Steps to Establishing a Vendor Risk Management Program

[4 min read] Why vendors may be the biggest security risk to your organization Of the companies that experienced a data breach in 2021, over 90% of...
Read more
March 9, 2022

Why The Location of Data is Critical to Data Security and Risk Management

[3 min read] It is amazing to think about how much data we all create these days. With so many employees working remotely, and the rise in the number...
Read more
February 23, 2022

Who owns data?

[4 min read] Data ownership is a complicated topic, much more complicated than most might think. We often talk about data security in possessive...
Read more
February 7, 2022

Do you know where your data is?

[5 min read] And who has access to it? When I talk to CEOs and security professionals about data security, the one question that continually trips...
Read more
September 9, 2021

5 Most Common Vendor Risk Management Mistakes and how to avoid them

[4 min read] When it comes to managing risk, companies often overlook their vendors. But Vendor Risk Management should be an integral element of any...
Read more
August 3, 2021

Remote vs Hybrid Work and the Real Cybersecurity Risk

[4 min read] We are at a turning point as companies are deciding what to do about returning to the office after the pandemic. As many schools prepare...
Read more
July 29, 2021

3 Steps to Improve Your Company's Security Posture

[4 min read] Late last year we wrote a blog that looked at Risk Management and Data Security and suggested what you might do differently as we headed...
Read more
July 16, 2021

How to avoid a Kaseya-type attack

[4 min read] There’s one thing that you can count on in the news right now and that’s another report of a data breach or ransomware attack. They seem...
Read more
August 29, 2019

Unpacking the SCF Capability Maturity Model

If you aren’t familiar with the Secure Controls Framework (SCF), you should be. It’s a non-profit organization dedicated to providing content that...
Read more
August 20, 2019

Cybersecurity Dictionary for 2019

In case you are new to the world of cybersecurity and are struggling to learn or understand some of the new terms you are hearing, don’t worry, we’re...
Read more
August 2, 2019

What the Capital One Breach Should Teach Us About Vendor Security Management

The news of the Capital One breach rocked the banking industry this week.  It is significant because it wasn’t a virus or an outside hacker but...
Read more
July 25, 2019

5 lessons learned from the Equifax breach

One of the biggest news items this week in the world of security is the Equifax settlement with the FTC. The Equifax data breach was one of the...
Read more
January 14, 2019

What's Needed for the Private Market to Take Data Security Seriously?

After the Marriott data breach, the Quora breach, the Anthem breach, and the Uber breach… well, you get the picture. After all of these data...
Read more
January 4, 2019

5 Data Privacy and Security Predictions for 2019

In 2018 we started to see the effect of a global grassroots movement that demands stronger data privacy parameters. As of December 2018, reported ...
Read more
January 2, 2019

Open Sesame! Is your password secure?

While “Open Sesame!” might be one of the oldest passwords, the recent National Cyber Security Center list of regularly used passwords makes for...
Read more
September 10, 2018

5 Ways to Protect Your Workforce Against Breach Fatigue

Is news of a data breach becoming “white noise”? Thanks to the sheer frequency of data breaches, the general attitude toward online security is...
Read more
August 27, 2018

Have you Identified What Data is Worth Defending?

Cyber experts like former Federal CISO Gregory Touhill feel that managing risk is paramount to, and more effective than, trying to defend everything,...
Read more
August 9, 2018

How do you Prevent Unauthorized Access to ePHI?

That’s a million dollar question. No, really, it could literally cost you millions not to know. In doubt? Fresenius isn’t. It’s cost the dialysis...
Read more
April 23, 2018

Curiosity Killed the Healthcare Organization

Study Shows that Healthcare's Internal Security Breaches Exceed External Ones Was that Lady Gaga in the emergency room? What kind of procedure is my...
Read more
December 20, 2017

ePHI Data Breaches: How to Reduce the Human Risk

As we wrap up 2017, the number of healthcare data breaches are up over 2016, with 41% caused by “insiders” per the Protenus Breach Barometer mid-year...
Read more
September 18, 2017

3 Meaningful Steps for Data Breach Prevention and Preparation

Reported data breaches show that HIPAA violation settlements are on the upswing, both in terms of the number of individuals affected and financial...
Read more
June 27, 2017

Do You Know What Data You Have? And How To Protect It?

Data breaches are at an all-time high in 2017. Many organizations cover data under one big security blanket. But what if you’re missing some of the...
Read more
February 3, 2016

Worst Passwords - are you using one of these?

Did you see the recent Forbes article on the 2015 worst passwords list? It is not hugely better news over last year’s list, but it is always a good...
Read more
September 14, 2015

It’s the people, stupid!

Why the big focus on technical security solutions is like a sound bite! Here we are at the primary season preceding the 2016 Presidential elections...
Read more
April 16, 2015

Disney Passwords - exploding the myth of password complexity

Cyber security has gone mainstream. Nick Helm proved this with his winning joke of the 2011 Edinburgh Fringe Festival. "I needed a password eight...
Read more
September 11, 2013

5 simple steps to secure your business

  Information Security is a taboo subject for many businesses. Business owners realize the importance of protecting their data (and consequently...
Read more