Company NewsCybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources CCPA Part 3: What Does That Mean For You? Our topic these last few posts has been the CCPA, which stands for the California…Kip BoyleSeptember 7, 2020
Company NewsCybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources CCPA: Part 2 The California Consumer Privacy Act is a law in, well... California. So why should you…Kip BoyleAugust 31, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources Cybersecurity and Law Firms: Part 2 Last time I established some key elements that law firms should keep in mind about…Kip BoyleAugust 17, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources Cybersecurity and Law Firms In the past I have talked extensively about attorney-client privilege (ACP) and how cooperating with…Kip BoyleAugust 10, 2020
Company NewsCybersecurity Executive ToolkitNetwork SecurityView All Resources Get to Know Active Defense Cybersecurity is often an elaborate medieval fortress, with firewalls and passwords and other types of…Kip BoyleAugust 3, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources Steps to Mastering Cyber security: Part 3 For my last installment about mastering cybersecurity, I'm going to answer the question I posed…Kip BoyleJuly 24, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecuritySecurity Risk AsessmentView All Resources Steps to Mastering Cyber Security: Part 2 Today, we’re continuing with my steps to master cybersecurity in part two of this series.…Kip BoyleJuly 20, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources Steps to Mastering Cyber Security: Part 1 For this series of blog posts, I'm going to do things a little differently. Instead…Kip BoyleJuly 13, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources Ransomware: Should You Pay the Ransom? For my last bit on ransomware, I'm going to focus on what the criminals want…Kip BoyleJuly 6, 2020
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityRecent Cyber Attacks Ransomware: Holding Your Data Hostage When you hear the word “malware,” what is your first thought? Probably something along the…Kip BoyleJune 22, 2020