(Updated from September 29, 2021)
Maria Catricala, on Sep 9, 2022 12:01:21 PM
If you believe your company is too small to be targeted by cybercriminals, think again. Due to their lack of substantial cyber security budgets, small businesses are often viewed by hackers as “low hanging fruit,” or easy targets. Statistics confirm this as well.
Maria Catricala, on Sep 2, 2022 12:18:34 PM
Maria Catricala, on Aug 31, 2022 1:34:55 PM
Your company's network and data are accessible via endpoints. Desktops, laptops, smartphones, tablets, servers, workstations, and even Internet-of-things (IoT) devices are examples of endpoints. Securing those endpoints is important as a lot of data ends up going through those endpoints.
Maria Catricala, on Aug 29, 2022 10:56:31 AM
If you are starting a new business, you want to get on the Internet. Businesses like yours get on the Internet for many reasons, but the most basic one is that to gain and retain customers, you need to have an Internet presence. There is a risk associated with having an Internet presence. Whether you have an informational website, an eCommerce website, or are transferring data through the cloud, the benefits of being online do come with some risks.
Maria Catricala, on Aug 24, 2022 10:16:40 AM
In general, resilience refers to the ability to bounce back quickly after adversity. Cyber resilience refers to being able to quickly recover from a cyber security challenge. In today’s cyber world, companies that are cyber resilient are the ones who will continue to thrive.
The ability for online banking has made our lives simpler. We can bank from the comfort of our homes, or anywhere in the world without having to go to a physical branch. Cryptocurrency has also brought investors a new revenue stream that keeps on growing. While all this is great, there is a risk involved when it comes to using financial information on the internet.
Maria Catricala, on Jul 29, 2022 11:17:59 AM
Compliance means: to conform by fulfilling requirements. In cybersecurity, compliance refers to fulfilling specific cybersecurity requirements, outlined by a governing body. In other words, government organizations, committees, and regulatory boards develop requirements (together called standards) outlining a baseline of cybersecurity protocols. For example, a requirement might be that organizations MUST have password restrictions in place, such as length, repetitiveness, and level of difficulty.
Many organizations feel that being prepared for a ransomware attack is futile. This couldn’t be further from the truth as told by BleepingComputer. Their article about the REvil ransomware attack on Kaseya VSA customers mentioned that many victims refused to pay the ransom. The reason: Backups!