The Great Firewall of China and Remote Employees

By |2019-06-06T11:30:06-04:00June 6th, 2019|Enterprise, Information Security, Privacy|

China has become a significant power in the global market, as evidenced by the fact that so many everyday items are marked “Made in China”. But China’s ability isn’t limited to simple toys and devices, the country also has advanced manufacturing technology and mature IT capabilities. As a result, many companies from outside of China [...]

Why NIAP Certification is Important To Private Sector Companies Too

By |2019-05-22T17:54:09-04:00May 23rd, 2019|Enterprise, Information Security|

When shopping for a cybersecurity solution, organizations often face the dilemma of too many choices. There are several dozen solutions in the marketplace, all of which claim to solve advanced cybersecurity needs. A certification that a particular solution lives up to its marketing can be a huge asset and can help have both time and [...]

Supply Chain Cyber Risks Associated With The Cloud

By |2019-05-20T17:04:54-04:00May 20th, 2019|Enterprise, Information Security|

Any business that has vendors, partners and/or customers, has a supply chain, and its most sensitive data flows along the entire length of that supply chain. Every link in the supply chain represents a potential vulnerability for a cyber attack. In other words, it's no longer good enough to secure yourself from your enemies, you [...]

FIPS Compliant Is Not The Same As FIPS Certified

By |2019-05-01T05:58:41-04:00May 6th, 2019|Information Security|

The Federal Information Processing Standard 140-2 (or FIPS 140-2) is a cryptography standard that non-military U.S. federal agencies, as well as government contractors and service providers, must comply with in order to work with any federal government entities that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information. The FIPS 140-2 security standard [...]

Public WiFi: A Tradeoff Of Convenience Vs. Security?

By |2019-05-22T07:03:30-04:00May 1st, 2019|Information Security|

Public WiFi is considered by many to be a convenience and a necessity. WiFi enables people to connect to work, news and family at all times and without incurring the cost of an Internet provider. But what about the security vulnerabilities of public WiFi? We were intrigued with a Lastline report recently shared by TechRerublic. [...]

Addressing The Cyber Threat Of A Mobile Workforce

By |2019-05-22T07:23:46-04:00April 15th, 2019|Information Security|

A mobile workforce can bring many benefits to an organization: cost savings, access to a more diverse or skilled talent pool and flexibility. However, from an information security standpoint, there are serious risks associated with remote, teleworking mobile employees.   A Growing Issue   The number of mobile workers throughout the world continues to increase [...]

Thwarting The Red Storm

By |2019-05-22T06:59:16-04:00March 18th, 2019|Information Security|

On the heels of the recently publicized internal review of the U.S. Navy’s cybersecurity, Lou Dobbs of Fox News discussed the current state of U.S. cyber warfare with Congressman Matt Gaetz, Asia expert Goron Chang and cyber security expert Morgan Wright. In a report titled “The Red Storm Has Arrived”, Dobbs stated that China has [...]

Halting The Cyber Siege

By |2019-05-22T07:25:49-04:00March 13th, 2019|Information Security|

The Wall Street Journal recently reported on an internal review of the U.S. Navy’s cybersecurity. The review began in October 2018 in response to several high-profile hacking incidents, such as a breach reported during June 2018 in which plans for a supersonic anti-ship missile were stolen from a company under contract with the Navy’s Naval [...]

When Can Industry Growth Be Dangerous?

By |2019-03-05T06:42:39-04:00March 5th, 2019|Information Security|

Industry growth is the end game for many organizations. Opening the doors to new opportunities paves the way for industry expansion and often creates jobs, boosts wages and increases company revenue. But industry growth can become very dangerous when it outpaces available cybersecurity technologies. Australia is an example where growth from technical expansion is outpacing [...]

Financial Sector Supply Chain Risk

By |2019-02-25T08:39:18-04:00February 19th, 2019|Finance, Information Security|

Nearly 40% of all cybersecurity breaches occur in the financial services sector. Cyber attacks range from distributed denial-of-service (DDoS) attacks, corporate account takeovers (CATO) and hacking via web applications. These attacks can result in significant losses in both revenue and corporate reputations for banks, asset managers, brokerage houses and insurance companies. The data managed in [...]