Blog
How to achieve effective cybercrime investigations
Different organizations and companies will define the stages within the lifecycle of a cyber security event a little differently. The National Institute of Standards and Technology (NIST) follows a four-step process of preparation, detection & analysis, containment, eradication & recovery, and post-incident activity. The International Organization for Standardization (ISO) quantifies the process with five stages: prepare, identify, assess, respond…
-
Ransomware – It’s all about the Benjamins
It was Ott Biederman, an accountant for American organized crime back at the turn of the 19th century that originally issued the famous immortal line, “Nothing personal, its just business.” That is what ransomware is today – just business. While there are occasional ransomware attacks initiated by state-sponsored groups to bring down the operations of…
-
How to achieve effective cybercrime investigations
Different organizations and companies will define the stages within the lifecycle of a cyber security event a little differently. The National Institute of Standards and Technology (NIST) follows a four-step process of preparation, detection & analysis, containment, eradication & recovery, and post-incident activity. The International Organization for Standardization (ISO) quantifies the process with five stages: prepare, identify, assess, respond…
-
Taking Ownership on Safer Internet Day
Where would the world be without the Internet? The Internet allows us to access massive amounts of information in seconds, connect with people all over the globe, educate ourselves on any topic we want, work and collaborate remotely, sell and buy from–and do countless more things that would have been unimaginable just 30 years ago. …
-
How Cyber Resiliency is Weakened by Organizational Struggles
We all know cybercrime is a major threat to businesses, but how much are internal issues impeding your organization’s ability to defend itself? Cyber resiliency is defined as the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources, according…
-
The Evolution of Merging Cybersecurity into Operations
How many times do you hear reference being made to the Chief Operating Officer of a company? Certainly, the CEO garners most of the attention as they are the figure head and recognized leader of the company. The CFO receives credit for the financial reporting of the company every earnings season and the CIO or…
-
Why a Tech Agnostic Cybersecurity Vendor is Critical in 2022
Animal Crossing: New Horizons took the world by storm during the pandemic, selling more than 13 million copies in just six weeks. The game was splashed across the news, captivating users stuck at home with limited entertainment options. Nintendo and Nintendo Switch owners welcomed the game’s release, but Xbox users were left out in the…