The stages of vulnerability management

Vulnerability management model

Cybersecurity and organizational preparedness have never been more important than they are right now. Both will become more important with every passing week. More advanced, more pervasive and more destructive cyber threats crop up every single day, and your vulnerability management plan has to be up to snuff to keep your company and its clients safe. But where do you … Read More

Cybersecurity tiers: how to move from Tier 1 to Tier 4 of preparedness

Cybersecurity tiers

Back in 2018, the National Institute of Standards and Technology released a report with a pretty bland name: Framework for Improving Critical Infrastructure Cybersecurity. But in that report is one of the most useful guides for how to think about organizational cybersecurity, how to improve your cybersecurity and how to stay secure even in a rapidly evolving threat environment. We … Read More

2022 Cybersecurity Predictions

cybersecurity

Sometimes, I wish I didn’t have to write about cybersecurity quite as much as I do. If it wasn’t such a dangerous and pervasive menace, I wouldn’t have to spend so much time researching it and writing about it. But as you can imagine, cyber threats are only getting more common, more widespread and more destructive. And for business owners … Read More

Your biggest cybersecurity threat in 2022 may just be… burnout?

burnout

There might never have been such a ripe time to experience professional burnout. We’re rounding the corner into Year 3 of a global pandemic; we’ve spent much of the last two years in some form of lockdown, juggling a new working reality all while figuring out child care, education, you name it… add in trying to maintain some semblance of … Read More

How Russian cyber weapons could impact your business

cyber weapons

Russia’s recent invasion of Ukraine is far from the first time Russia has exhibited hostilities toward Ukraine. Beyond the annexation of Crimea in 2014, Russia has been practicing and perfecting its cyber arsenal using Ukraine as a training ground for years. From physical infrastructure system attacks (like on Ukraine’s power grid), to devastatingly simple rogue worms that escape Ukraine’s borders … Read More

Cyber insurance: why you need it, what it takes to qualify

cyber insurance

We’ve written time and time again about protecting your company and its assets from cyber attacks. Threat vectors are multiplying in both form and function while the rise of ransomware-as-a-service should give any business leader nightmares for how accessible it makes carrying out sophisticated cyberattacks to would-be hackers. So what do you do? How do you protect yourself against downside … Read More

Critical Apache Log4j vulnerability — what you need to know

Log4j

Every week it seems, the public finds out about a critical piece of digital infrastructure that’s providing an unwitting vulnerability for hackers to exploit. Unless you’re a CIO or work in cybersecurity/risk mitigation, you may not even know how integral some of these systems are when the vulnerabilities are disclosed. That might be true for the most recent high-profile announcement … Read More

Microsoft Power apps misconfiguration exposes 38MM sensitive records

misconfiguration

Not every major data breach or cybersecurity incident is the work of master hackers with government-level resources and support. As we’ve discussed here before, ransomware as a service is a large and growing threat to small and medium-sized businesses the country over. But, it’s not always nefarious actors who are deliberately targeting you that you have to worry about — … Read More

The ransomware protection checklist

ransomware

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a detailed report about the ransomware-du-jour, BlackMatter. Similar to other Ransomware-as-a-Service threat vectors (which we’ve written about before), it’s cheap and easy to deploy, utterly devastating to infected systems, and cause for real concern in the IT community. I wish this wasn’t such a tired story, but this is life in … Read More

How SIEM can protect your business from cyberattacks

SIEM

There really is no way to overstate the cyberthreat environment small and medium-sized businesses find themselves in today. Attacks are up across the board (and not just for large enterprises). The tools hackers are using are both more advanced and more pernicious… all while being more widely available. Now, this shouldn’t come as that big of a surprise to anyone … Read More