Attack surfaces refer to the total possible entry points (also known as attack vectors) for unauthorized access into any system. The recent increase in remote and hybrid work combined with the shift to the cloud and widespread implementation of software-as-a-service …
Posts Categorized: Cyber
Managing End-of-Life Software
At some point, all software will reach the end of its life. This means manufacturers will no longer develop or service the product, discontinuing all technical support, bug fixes and security upgrades. As a result, this end-of-life (EOL) software will …
Essential Elements of Cyber Hygiene
As cyberattacks become more frequent and severe, it’s increasingly important for organizations to practice good cyber hygiene—habitual practices ensuring critical data and connected devices are handled safely—to minimize their digital exposures. Some consequences of poor cyber hygiene include:
- Security breaches
New Federal Cybersecurity Regulations – What Every Business Needs to Know Going into 2023
About the Webinar
In March, President Biden signed SACA, the Strengthening American Cybersecurity Act of 2022. This webinar will talk about what we do and don’t currently know about the impending regulations, and how businesses can get ahead of the
Cybersecurity Tips for Business Travelers
Organizations face heightened cybersecurity risks when their employees travel. Business travelers are prime targets for cybercriminals, as they often carry valuable data and may not always be careful about securing their devices. According to research from Morning Consult on behalf …
The Importance of Two-factor Authentication
As cyber attacks become more and more common, protecting your data is increasingly difficult. In fact, a study from Juniper Research found that by 2023, cyber criminals are expected to steal an estimated 33 billion records. In light of the …
CISA’s Known Exploited Vulnerability Catalog Explained
The Cybersecurity & Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog to help organizations better manage and mitigate cybersecurity vulnerabilities. The agency encourages organizations to utilize the KEV catalog—the authoritative list of vulnerabilities that have been exploited—to …
DDoS Attacks Explained
A distributed denial-of-service (DDoS) cyberattack occurs when a cybercriminal attempts to interrupt an online service by flooding it with fake traffic. This can be achieved by overwhelming various aspects of an organization’s system, such as servers, devices, networks and applications. …
3 Components of Cyber Risk Management
If your company stores data and information digitally, you should have a cyber risk management program that addresses prevention, disclosure, crisis management and insurance coverage in the event of a data breach. Good cyber risk management requires the planning and …
Planning for Digital Defense: A Deeper Dive into Cyber Policies for Technical and Non-Technical Managers
About the Webinar
Join Jim Kilmer, cyber expert, as he discusses easy ways to make your business more secure.