Cybersecurity Executive ToolkitCybersecurity PolicySecurity Risk AsessmentView All Resources Cyber Risk Management and Attorney-Client Privilege Series Part 2 The Attorney Work-Product Doctrine Continuing from the last post on attorney-client privilege (ACP), I'd like…Kip BoyleApril 28, 2020
Company NewsCybersecurity Executive ToolkitCybersecurity ThreatsRecent Cyber AttacksView All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 4 Who is the Target? In my previous article on NotPetya, I talked about other targets…Kip BoyleApril 14, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsSecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 5 This blog post originally published in 2018. Fire, Flood, and Cybersecurity In some respects, cybersecurity…Kip BoyleMarch 17, 2020
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityPodcastsQuestions & AnswersView All Resources What are some little-known cybersecurity incursions of the early 21st century? How about a great story about a cybersecurity incursion in the late 20th century? What’s…Kip BoyleFebruary 11, 2020
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources Can the WiFi owner see what I’m browsing? Yes, in the U.S., they have both the right and ability to monitor your online…Kip BoyleFebruary 4, 2020
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources Is it worth paying for a VPN? If you need a VPN, then it's worth paying for one. I suggest you choose…Kip BoyleJanuary 28, 2020
Cybersecurity Executive ToolkitQuestions & AnswersView All Resources Do business leaders lack urgency in understanding cyber risks? In a recent LinkedIn post, a user asked this question. Question: "In my experience, businesses…Kip BoyleJanuary 21, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyRecent Cyber AttacksView All Resources Excellent Example of PR During A Cyber Attack The cybersecurity world is full of horror stories. Examples of "what not to do." Now,…Kip BoyleJanuary 14, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyQuestions & AnswersView All Resources How can I write an email regarding IT Security that will be read, and not ignored by the end user? If you really want to change the way people behave, the core issue isn’t how…Kip BoyleDecember 31, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork Security What is more important, length or diversity of a password? Length. Here’s a simple example. Which of these passwords is more attack-resistant? &^567*=M barbell-farther-grocery-sans-bluster-voyageur It’s…Kip BoyleDecember 24, 2019