Archive for Cybersecurity

Your Antivirus Solution Alone, Stinks

That’s right, it’s not as good as it should be, but let’s redirect blame to the bad actors and the ingenious methods they use to evade your end point security.

CIS Controls v7

Worms, viruses, phishing, advanced persistent threats (APT), IoT devices, users clicking on bad links, attacks from organized nation states…where do you start to defend?

How To Detect Phishing: A Beginner’s Guide

Here are some helpful tips to spot phishing attempts, not only for hedge funds and private equity firms, but for all organizations.

What Does Your MDR Solution Really Do?

There are a ton of Managed Detection & Response (MDR) services out there, but breaking them down in plain English so you know what you’re really getting is a bit tougher.

Don’t be a Victim of Income Tax Identity Theft

Learn about income tax identity theft and how to avoid becoming a victim of criminals who target computers used to electronically file taxes with the IRS.

SEC Warns of Fraudsters

The SEC issued a warning to the public concerning fraudsters, who are impersonating the SEC in an attempt to trick potential victims to steal both personal information and money.

In Cybersecurity, Governance Trumps Technology

A strong cybersecurity program depends on governance to ensure broad participation, establish clear authority, and enable fully informed decision-making.

The CIA Triad of Information Security: Availability

The third part of the CIA triad — availability — often surprises people. Contrary to popular belief, being “secure” does not mean locking down your information.

The CIA Triad of Information Security: Integrity

As the “I” in the CIA triad, integrity is essential to a strong information security program.

The CIA Triad of Information Security: Confidentiality

The CIA triad is a base standard that every organization needs. In this first blog in a series of three, we examine the nuances of confidentiality.

The Importance of Physical Security

Every organization should mitigate tangible threats in their area.

National Cybersecurity Awareness Month: Finale

If you’re like most, it probably took you 61 days to discover you even had a breach in the first place (we can help with that).