Cyber security risk assessment is an essential element of any information security program. As the technology landscape continues to evolve, your company needs to take appropriate steps to make sure your data isn’t vulnerable to potential threats. A great resource for conducting risk assessments is the U.S. Department of Commerce National Institute of Standards and Technology Guide for Conducting Risk Assessments, often referred to by its publication number, NIST 800-30.
Just like the end of Windows XP, which many of us loved, Windows 7 lifespan is coming to an end. It is imperative that your business is thinking about what you are going to do when Microsoft is no longer providing security updates. Without these updates’ your operating systems will be wide open to security risks and cyber attacks. You have almost a year before the expiration, so steps should be taken soon to defray any expenses which
As with any well-built system, effective cyber security begins with building a solid security foundation. Without thoughtful attention to building a good foundation, a business will remain vulnerable to hacks and breaches until they finally decide to face cyber security issues head on. Assessment When first addressing an issue, one must first assess all the security issues, both the obvious and the potential ones. Assessing a company’s technology vulnerabilities must
As internet scams become more and more sophisticated extortion scammers have found another new piece of bait by which to hook internet users and that is with their old passwords. These extortion schemes often claim that someone has the person’s compromising information and that they are happy to help get that information back if the person is willing to pay them to do so. Fearing that their information is going
Consumers and many employers suffered a significant blow with the massive data breach recently revealed by Marriott International Hotels. Their hacked data included personal information from nearly half a billion guests. Marriott’s reservation system for their Starwood line of hotels exposed personal data including guest names, passport numbers, phone numbers, email and mailing addresses, along with some credit card information which included the encryption software that could decode the stolen