Cyber Security
How To Know If Network Pen Testing Is The Right Move
What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or “pen testing” for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. This type of testing can either be automated and performed by specially designed computer software,…
ContinuedThe Danger Of The Insider Threat, And Why Biotech And Pharma Should Care
The cyber security situation for nearly every industry is a precarious one, but few have it worse right now than biotech and pharma. I see this first hand in the day to day work my company does protecting Pharmaceutical and Biotechnology businesses from cyber threats, but I’m not the only one witnessing a trend. According to one recent study, the pharmaceutical sector is the biggest target of criminals around the…
Continued10 Cyber Security Awareness Tips
There’s so much information out there about hacks, threats and cyber security in general that it can be natural to feel overwhelmed and fatigued. You understand that the consequences of leaving your business exposed are severe – but at the same time, you don’t know where to begin to address them. You may even have a security strategy, but you’re not sure how well it would stand up to the…
ContinuedWhat Has Pharma Learned from the Merck Cyber Attack
If you had to make a list of some of the most pressing issues that we’re facing as a society, cybersecurity would undoubtedly be right at the top. Cybersecurity is a pressing issue to pharmaceutical businesses in particular, for a significant number of reasons. In 2017, one study revealed that about 54% of companies experienced one or more successful attacks that compromised data and/or their larger IT infrastructure at some…
ContinuedControlling the Cyber Security Costs: Why It’s a Lot Easier Than You Think
One of the common themes that’s permeated a lot of the meetings I’ve been having with both current and prospective clients lately can all be summed up in a single word: security. These chats may not, however, be taking the shape you probably think they are. Yes, cyber security is critical and it’s an issue that is only getting more pressing as time goes on. But I’ve also found that…
ContinuedCyber Crime Cases: Infected USB Drives Distributed at Data Security Event
During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
