As Seen On:

Posts Tagged ‘PII’

Cyber Insurance Risk Assessments

Preparing Your Business for Cybersecurity Insurance Coverage A single click on a phishing link, bad attachment, or malicious email by an unsuspecting employee and, before you know it, your business has been breached. Malware can quickly invade your company network ...

ORAM's Complete Guide to Password and Passphrase Security in 2022

In the last five years, best practices for passwords have changed and that has been in direct response to changes in the methods cybercriminals are using to execute attacks and breaches. Malware was once the main way bad actors invaded ...

What to Know About Cybersecurity Insurance

As adults, we insure our investments from cars to homes and even our lives. Business owners buy insurance for a multitude of purposes, but many have never considered or even heard of cyber insurance. With the ever-growing number of cyber ...

Why a WISP Template is Not the Answer

When it comes to producing a functional, adaptable, and successful written information security plan (WISP) for any company, business leaders must understand that it is not a single document, but a puzzle consisting of many moveable pieces. A WISP is ...

Hard Disk Encryption for Laptops: Why You Need It

Laptops are mobile devices. They are convenient for work and play because they can go anywhere. The drawback is that convenience and mobility also mean they can be easily stolen along with the data they contain. This is why hard ...

Everything You Need To Know About Cybersecurity Audits

Every business leader has heard of an audit but not everyone may be familiar with cybersecurity audits. Like other types of auditing, a cybersecurity audit looks at how secure your business data is from both a digital and physical standpoint. ...

Instating an Email Resilience Program

Fighting advanced persistent threats and targeted attacks No longer are hackers just throwing out random email attacks harboring spam, viruses, and malware. The modern bad actor utilizes targeted email attacks to compromise the security of a business. This allows them ...

Key Insights for Businesses Regarding Cyberattacks

Most business leaders already understand the devastation a cyberattack can have on an organization. As a matter of fact, a study by Accenture called The Cost of Cybercrime demonstrates that 68 percent of business leaders feel their cybersecurity risks are ...

Email Spoofing: What It Is, How It Works, and Recognizing an Attack

It sounds like a word made up by a five-year-old- Spoofing! The truth is that spoofing is more insidious than anything a child could imagine and is more along the lines of something Loki, the Norse trickster god, would conjure ...

Common Methods Cybercriminals Use to Breach Your Business

There are many ways bad actors can penetrate your business, steal your data, and hold your company ransom. While some are nearly laughable, all are very sneaky and deceitful. Here are some of the most common methods cybercriminals use to ...

Contact

HEADQUARTERS

163 Reservoir Street
Suite 1
Needham, MA 02494

Phone: 617-933-5060

ORANGE COUNTY/LA

695 Town Center Drive
Suite 1200
Costa Mesa, CA 92626

Phone: 949-832-1120

Social Media