Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 271 - 280 of 288
Do you aggregate? In layman’s terms, do you download or link your financial information to one place? You may use mint.com, or Intuit’s Quicken,

Air Gapped SCADA & ICS Networks Now Threatened From Ransomware

In my role as IT Audit Security Manager, I drafted this brief review of a new cybersecurity threat involving the use of SCADA & ICS systems. This new

IT Security Tip Sheet: Using a Wireless Keyboard? What You Should Know

In my role as IT Audit Security Manager, I drafted this brief review of a new cybersecurity threat involving the use of wireless keyboards. Many businesses

IT Security Tip Sheet: From Pokémon to the Microsoft Print Spooler Bug

Cybersecurity and IT issues have been hot topics in the news lately, and it’s never been more important to stay informed. In my role as IT Audit
Register to receive our weekly newsletter with our most recent columns and insights.

CISO On-Demand: A New Option

Chief Information Security Officer (CISO), or the equivalent function, has become a standard in business, government and the non-profit sector throughout

Quick, Uninstall Apple's QuickTime!

According to Trend Micro, Apple’s QuickTime for Microsoft Windows is being completely removed from their support life cycle and will no longer provide
In our Winter edition of OnPoint I discussed the European Union’s October 6 ruling against the Safe Harbor data-sharing agreement between the United

Healthcare Organizations Can Implement the NIST Cybersecurity Framework with HITRUST

Healthcare organizations face growing challenges in regards to protecting their patient information. Recent studies found that the healthcare sector had
Register to receive our weekly newsletter with our most recent columns and insights.

A Bank Customer's Guide to Cybersecurity

The Federal Deposit Insurance Corporation (FDIC) recently published a special edition of its quarterly FDIC Consumer News, titled “A Bank Customer's

Don't Let Ransomware Hold You or Your Company Hostage

Ransomware attacks, where cyber hackers hold your systems and data hostage until you pay a ransom, have been increasing in popularity recently and are
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×