New Email from Evil Corp
In late 2019, the U.S. Justice Department was applauded for arresting the alleged masterminds Dridex, a malware prevalently used in successful phishing attacks.
In late 2019, the U.S. Justice Department was applauded for arresting the alleged masterminds Dridex, a malware prevalently used in successful phishing attacks.
As alternative investment firms consider reopening their offices, many hedge fund and private equity CTOs are asking about the cybersecurity implications of moving to a shared office model.
If you’re a CTO, you’ve seen the joke: Do most companies have a disaster recovery plan (DRP) in place? Yes.
Pursuing a HITRUST certification might free up key resources to accelerate your business.
This week was rough for Twitter- they suffered a major breach that led to high-profile accounts being hacked.
Verizon’s 2020 Data Breach Investigation Report (DBIR) is out and, as usual, provides some of the richest data available.
Telecommuting isn’t new, but not every business thought it was right for them. Enter COVID-19: the virus that turned outdated thinking on its head.
Here’s how the most successful CTOs, CISOs, COOs, CFOs, and CCOs have been leading their organizations through the ongoing COVID-19 crisis.
COVID-19 came out of nowhere, set up camp, and put everyone physically and mentally at risk–not to mention stretching your business continuity plan beyond anything you planned for.
Four reasons why our clients are finding value in our HITRUST Advisory Partnership now more than ever.
Here’s a list of cybersecurity reminders you can share with your remote workforce to refresh their understanding of your firm’s cybersecurity expectations and their role in keeping the firm secure.
While firms thought their SOC 2 Type 2, PCI RoC, or NIST certification got your organization in the clear, many are being tasked with HITRUST certification by a healthcare provider, a payor, or another important third party or client.
Visit our SEC Resource Page for the tools and insights you need to evaluate your firm’s current cyber policies and procedures and identify gaps to address prior to the final rule implementation.
This is the text content