Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 1 - 10 of 73

Cybersecurity & Employee Benefit Plans

The threat of a cyberattack is prevalent throughout the business world. Given the highly sensitive data held within employee benefit plans, it should come

The Dichotomy of Cybersecurity in Higher Education

Cybersecurity in the higher education (Higher Ed) realm faces many challenges. Unlike corporate entities, there may be many groups outside of central IT

New features for enhanced password protection in Azure Active Directory

In a previous Our Thoughts on Article, we described a threat to organizations known as password spraying, in which an attacker attempts to login to all

Using Your Mail Server Against You

Occasionally on penetration testing/ethical hacking engagements we encounter misconfigured mail servers which creates an opportunity to either gather information

Register to receive our weekly newsletter with our most recent columns and insights.

California First to Require IoT Security

The majority of cyber-attacks are not targeted, rather they are opportunistic, using automated phishing and vulnerability scans. Attackers usually identify

Better Understanding PCI Penetration Testing Requirements

If your company takes credit cards, you may be wondering if you are required to have a penetration test. In the past, it had been voluntary, but with PCI

What is the SEC Looking For in Your Internal Control Environment?

This Article was co-written by Nicole Saldamarco At the recent AICPA year-end conference, SEC staff members indicated that they will be looking more closely

Understanding Cyberthreats in our Energy Infrastructure

Cybercrime Motive Most cyberattacks are simply motivated by money – revenue from cybercrime has reached nearly $1.5 trillion per year. The majority

Register to receive our weekly newsletter with our most recent columns and insights.

Addressing Technology Risks within the Financial Services Industry

As rapidly as technology evolves, so does the inherent risk surrounding that technology. It has now become ever so critical to ensure appropriate mitigation

Don't Acquire the Data Breach - The Importance of Cybersecurity and Information Technology Due Diligence

Co-Authored by: Eric Fair As businesses evolve through mergers and acquisitions (M&A), the ever-changing technology landscape continues to provide

Register to receive our weekly newsletter with our most recent columns and insights.