Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 221 - 230 of 235

IT Security Tip Sheet: From Pokémon to the Microsoft Print Spooler Bug

Cybersecurity and IT issues have been hot topics in the news lately, and it’s never been more important to stay informed. In my role as IT Audit

CISO On-Demand: A New Option

Chief Information Security Officer (CISO), or the equivalent function, has become a standard in business, government and the non-profit sector throughout

Quick, Uninstall Apple's QuickTime!

According to Trend Micro, Apple’s QuickTime for Microsoft Windows is being completely removed from their support life cycle and will no longer provide

Safe Harbor 2.0 - Update

In our Winter edition of OnPoint I discussed the European Union’s October 6 ruling against the Safe Harbor data-sharing agreement between the United
Register to receive our weekly newsletter with our most recent columns and insights.

Healthcare Organizations Can Implement the NIST Cybersecurity Framework with HITRUST

Healthcare organizations face growing challenges in regards to protecting their patient information. Recent studies found that the healthcare sector had

A Bank Customer's Guide to Cybersecurity

The Federal Deposit Insurance Corporation (FDIC) recently published a special edition of its quarterly FDIC Consumer News, titled “A Bank Customer's

Don't Let Ransomware Hold You or Your Company Hostage

Ransomware attacks, where cyber hackers hold your systems and data hostage until you pay a ransom, have been increasing in popularity recently and are

Another Data Breach at the IRS

The IRS issued a statement on Tuesday, February 9 that it had identified and halted an automated cyberattack that occurred in January of this year. The
Register to receive our weekly newsletter with our most recent columns and insights.

Cybersecurity, Where Do We Begin? Measuring Your Organization's Security with NIST Cybersecurity Framework

The concept of cybersecurity can be a daunting thought. The world of information technology alone is filled with complexity, then you add in business requirements

Developing a Cybersecurity Culture in the Workplace

As we mention in our article about Cybersecurity frameworks, everyday employees are often the target of cybercriminals who intend to circumvent common
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×