
For this series of blog posts, I’m going to do things a little differently. Instead of talking in detail about one topic or aspect of cybersecurity, I’m going to be…
For this series of blog posts, I’m going to do things a little differently. Instead of talking in detail about one topic or aspect of cybersecurity, I’m going to be…
For my last bit on ransomware, I’m going to focus on what the criminals want you to do, which is to pay the ransom. In my previous post, I talked…
To continue from my last post, who do cybercriminals generally attack with ransomware? A lot of targets are people who don’t update their software or use outdated software, as well…
We are going to continue off of the previous blog and learn a little more about the GDPR. When you go out to the restaurant with a group of your…
As cybercrime becomes more prevalent, international governing bodies and individual governments have set standards for cybersecurity in companies that handle their customers’ data. I’ve previously talked about the FTC and…
How does the Recovery function benefit the affected organization if they do it well? According to publicly available data, a company can lose 6.5% of its customer base in the…
What can we learn from Real-Life Examples? Retail giants Target and Home Depot are two notorious examples of large-scale cyber-attacks. In both cases, tens of millions of credit cards were…
How to Apply NIST Cybersecurity Framework to your Organization Remember, in the last post, when I referred to DE.CM-7? I’m going to use this specific code again for my…
What is NIST? Over the years, some executives that I’ve spoken with have thought that cyber risk management means buying and installing a bunch of software and hardware products, then…
What is ACP? To wrap things up in this series, I’m going to explain how ACP (attorney-client privilege) and AWP (attorney work product) apply to your company’s cybersecurity efforts. To…