Data Breaches: Why It’s a Bad Time to be a Financial Services Firm

By |2019-08-08T15:41:24-04:00August 8th, 2019|Blog, Enterprise, Finance, Information Security, Privacy|

Is your data safe anywhere? Apparently not. "For Americans who want to protect their personal information, there is no way, in our current system, to do so," claimed a recent article in the Atlantic.   Back in 2017, a data breach at credit reporting agency Equifax left the personal information of 143 million consumers exposed. The [...]

Implications of the DoD’s Cybersecurity Maturity Model Certification

By |2019-07-22T14:59:41-04:00July 22nd, 2019|Blog, Government, Information Security|

The US Department of Defense (DoD) has announced its intention to enact a new cybersecurity standard for defense contractors called the Cybersecurity Maturity Model Certification (CMMC). While the details of this certification are not yet finalized, the intent is to improve the current level of cybersecurity present in the US defense industrial base (DIB). [...]

Securing The Internet Of Things

By |2019-07-17T15:59:59-04:00July 11th, 2019|Blog, Enterprise, Information Security|

The Internet of Things (IoT) has brought about large advancements in convenience for both personal and professional life. By enabling remote management and monitoring, IoT devices help improve quality of life in countless ways. As a result, the IoT market is booming, with the market expected to reach $520 billion by 2021. Unfortunately, IoT’s second [...]

Cyberwarfare: How to Protect your Enterprise on the Front Lines

By |2019-07-17T15:59:14-04:00June 27th, 2019|Blog, Enterprise, Information Security|

According to a recent Washington Post article, tensions between the United States and Iran have gone digital, as the United States recently launched a cyber attack against the Islamic Republic’s rocket and missile launching systems in response to the Iranian drowning of a U.S. military drone. In the past, pretty most business enterprises could carry [...]

The Great Firewall of China and Remote Employees

By |2019-07-17T15:58:50-04:00June 6th, 2019|Enterprise, Information Security, Privacy|

China has become a significant power in the global market, as evidenced by the fact that so many everyday items are marked “Made in China”. But China’s ability isn’t limited to simple toys and devices, the country also has advanced manufacturing technology and mature IT capabilities. As a result, many companies from outside of China [...]

Why NIAP Certification is Important To Private Sector Companies Too

By |2019-07-17T15:58:28-04:00May 23rd, 2019|Enterprise, Information Security|

When shopping for a cybersecurity solution, organizations often face the dilemma of too many choices. There are several dozen solutions in the marketplace, all of which claim to solve advanced cybersecurity needs. A certification that a particular solution lives up to its marketing can be a huge asset and can help have both time and [...]

Supply Chain Cyber Risks Associated With The Cloud

By |2019-07-17T15:57:54-04:00May 20th, 2019|Enterprise, Information Security|

Any business that has vendors, partners and/or customers, has a supply chain, and its most sensitive data flows along the entire length of that supply chain. Every link in the supply chain represents a potential vulnerability for a cyber attack. In other words, it's no longer good enough to secure yourself from your enemies, you [...]

FIPS Compliant Is Not The Same As FIPS Certified

By |2019-07-17T15:57:26-04:00May 6th, 2019|Information Security|

The Federal Information Processing Standard 140-2 (or FIPS 140-2) is a cryptography standard that non-military U.S. federal agencies, as well as government contractors and service providers, must comply with in order to work with any federal government entities that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information. The FIPS 140-2 security standard [...]

Public WiFi: A Tradeoff Of Convenience Vs. Security?

By |2019-07-17T15:54:07-04:00May 1st, 2019|Information Security|

Public WiFi is considered by many to be a convenience and a necessity. WiFi enables people to connect to work, news and family at all times and without incurring the cost of an Internet provider. But what about the security vulnerabilities of public WiFi? We were intrigued with a Lastline report recently shared by TechRerublic. [...]

Addressing The Cyber Threat Of A Mobile Workforce

By |2019-07-17T15:54:25-04:00April 15th, 2019|Information Security|

A mobile workforce can bring many benefits to an organization: cost savings, access to a more diverse or skilled talent pool and flexibility. However, from an information security standpoint, there are serious risks associated with remote, teleworking mobile employees.   A Growing Issue   The number of mobile workers throughout the world continues to increase [...]