small medium business

We Are All A Cyber Fraud Target. 5 Tips To Help You To Be Cyber Secure.

As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.

It Looks Like Your SMB Needs A New List Of Cybersecurity Resolutions

We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.

GDPR Will Have A Big Impact On Small And Medium Business - Part 1

GDPR is a complex regulation comprised of 99 articles. In this 3 part series, we’ll break down the components of GDPR starting with an overview of the regulation and why you need to start preparing now. Part 2 will discuss some of the key elements including obtaining valid consent, online data technologies, privacy notices and cross border transfer. Part 3 will dive deeper into understanding the obligations of a Data Controller and Data Processors, individual rights, and the 72 hour data breach notification requirement.

Your Firewall Won’t Save You From The Next DDoS Attack

“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” - Abraham Maslow, The Psychology of Science, 1966. But using firewalls to protect against DDoS attacks has its limitations.

Seriously?! Can You Not Do That? Chapter III - External Internet Access

Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.

I Ran The Boston Marathon. Here is What I Learned

Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.

The Side Effects Of A Technology Craving Society - Part 2

When technology evolves faster than our ability to make sure there's a viable level of safety, how do we educate businesses and the layperson on best practices for IoT security? In this part 2 InfoSec Life article, Phil Agcaoili, CISO, shares his views on the need to raise InfoSec awareness in society while striving for (and embracing) diversity in cybersecurity. 

Cyber Threats Have Evolved. How About Your Insurance?

Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?

A Dialogue with Dinah Davis - Founder of Code Like a Girl

The founder of “Code Like A Girl” explains the overt sexism she experienced growing up, later in college and in the corporate world merely due to her gender, which made her only more determined to make strides for women who are interested in a tech-oriented career.

Data Breaches Happen to SMBs Too. Often Because of Human Error

Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.

5 Best Practices to Protect Your Small Business from Cyber Attacks

Most small businesses think that they can’t or won’t be the victims of cyber attack — that fraudsters and hackers are only interested in going after large corporations. Think again — and consider these 5 best practices when you do.

Small Businesses Need an Affordable, Qualified Cybersecurity Workforce

In the fragmented world of cybersecurity, equipping small businesses for cyber threats and preparing the next generation of infosec professionals will require community-based workforce development.