dcsimg

Top 5 Ways to Win your CEO/CTOs Heart

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But with today’s massive data … [Read more...]

Cybersecurity for Dummies Part 1: Making Cybersecurity Everyone’s Responsibility

In our always-connected world where the private information of individuals and organizations is vulnerable to exposure and misuse, cybersecurity is everyone’s responsibility because hackers or malicious threat actors who steal proprietary information don’t care about age, gender, race, culture, beliefs, or nationality. They probe your digital footprint and your Internet-connected computers based … [Read more...]

Data Privacy Day: Where has privacy gone, and will we ever get it back?

Privacy is gone, but never forgotten. Can our current path even be reversed? Yes, the end of privacy as we know it is closer than you may think.  Privacy definitions are very different between nation states and cultures, though one common thread is that privacy is becoming less of an option for most citizens, globally. In the coming years, we are going to see major head-to-head debates between … [Read more...]

Cybersecurity for Dummies Part 2: Responding in the Wake of a Cyber Attack

With cyber threats, it’s a matter of when and not if you’re going to be impacted. Some attacks are within your control, and some aren’t, so you need to be prepared for what to do when you do become a victim. Understanding the method of threats you face can help you identify any hack or compromise before it becomes a major incident. Following Your Company Incident Response Plan If your company … [Read more...]

Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template?

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy? Let’s get the easy part out of the way: if your organization has its PAM Policy clearly defined in a template, yet users are left … [Read more...]

The Land of the Free just lost one of its most important freedoms: The Freedom of the Internet

Net Neutrality, just like privacy, is gone in the U.S.  For many citizens net neutrality is something that either seems confusing, or is lost in translation. ISPs now have full control over what content you see on the internet Basically, what has happened is that the FCC have handed control of internet services and content to the Internet Service Providers (ISPs). The ISPs now have full control … [Read more...]

Cyber Security: What we’ve learned in 2017 to get ready for 2018

Well, it’s been a very interesting year with a few surprises along the way, but as expected, cyber crime grew, financial impact was huge and many companies struggled to recover. Cyber attacks will be the biggest threat to every person and business on earth Cyber security is quickly becoming part of everyone’s daily life and can no longer be separated into personal and work life. In the past cyber … [Read more...]

PAM Risk Assessment: your first step to better privileged access control

These days Privileged Access Management and Privileged Account Management (PAM) are interchangeable terms that get a lot of attention. There’s a reason why PAM is fast becoming a top-of-mind cybersecurity issue:  up to 80% of cybersecurity breaches are associated with the abuse or misuse of privileged account credentials. And these credentials readily give hackers or malicious insiders access to … [Read more...]

Privileged Password 101: What exactly is it?

As the total universe of passwords will likely grow to more than 300 billion by 2020, people and organizations across the world face a massively growing cyber security risk from hacked or compromised user and privileged accounts—sometimes a single password being the only security control preventing cyber criminals from gaining access to the victim’s sensitive information. Apple’s face ID has … [Read more...]

Majority of Companies are failing at cyber security metrics, and investing blindly

Thycotic has released the research results from its Security Measurement Index survey. The resulting “2017 State of Cyber Security Metrics Annual Report“ identifies how companies worldwide are measuring the effectiveness and success of their cyber security strategy. The report is far from comforting Companies and governments world-wide are often just one click or one password away from being … [Read more...]