Company NewsCybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources CCPA Part 3: What Does That Mean For You? Our topic these last few posts has been the CCPA, which stands for the California…Kip BoyleSeptember 7, 2020
Company NewsCybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources CCPA: Part 2 The California Consumer Privacy Act is a law in, well... California. So why should you…Kip BoyleAugust 31, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources Cybersecurity and Law Firms: Part 2 Last time I established some key elements that law firms should keep in mind about…Kip BoyleAugust 17, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources Cybersecurity and Law Firms In the past I have talked extensively about attorney-client privilege (ACP) and how cooperating with…Kip BoyleAugust 10, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources Steps to Mastering Cyber security: Part 3 For my last installment about mastering cybersecurity, I'm going to answer the question I posed…Kip BoyleJuly 24, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecuritySecurity Risk AsessmentView All Resources Steps to Mastering Cyber Security: Part 2 Today, we’re continuing with my steps to master cybersecurity in part two of this series.…Kip BoyleJuly 20, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources Steps to Mastering Cyber Security: Part 1 For this series of blog posts, I'm going to do things a little differently. Instead…Kip BoyleJuly 13, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources Ransomware: Should You Pay the Ransom? For my last bit on ransomware, I'm going to focus on what the criminals want…Kip BoyleJuly 6, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsView All Resources Ransomware: Who are the Targets? To continue from my last post, who do cybercriminals generally attack with ransomware? A lot…Kip BoyleJune 29, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources How is GDPR similar to HIPAA?! We are going to continue off of the previous blog and learn a little more…Kip BoyleJune 16, 2020