May 1, 2025

Modernizing Applications for Better Performance and Stronger Security

In many organizations, outdated applications slow down daily operations and introduce security risks. Modernizing these systems can be difficult, but clear strategies and reliable practices can streamline the effort. Learn how a well-planned modernization journey yields tangible results for both users and the bottom line.

Read more
CyberWatch
|
3 min read
April 17, 2025

Shared Responsibility in the Divided Cloud

In the cloud computing space, it’s important to understand that using a cloud service provider (CSP) isn’t a “set it and forget it” relationship. The shared responsibility model clearly divides security, compliance, and operational tasks between CSPs and the organizations that use their services. However, nothing solidifies these concepts like seeing them in real-world examples. This article explores three brief case studies—each drawn from a different cloud service model (IaaS, PaaS, and SaaS)—to highlight how responsibilities shift across the spectrum.

Read more
CyberWatch
|
3 min read
April 11, 2025

Employing the Concept of “Continuity of Care” in Cybersecurity

My wife, Kelly, was a pediatric nurse, having worked in healthcare for over 30 years. I'm biased, but she always got high marks in her profession, from both her peers and from patients for whom she provided care. She provided a level of care that was absolutely critical to ensure patients receive consistent, high-quality treatment across all stages of care. The importance of documentation, communication and a continuity of care was imperative – children’s lives depended on it. But what does continuity of care look like outside the world of healthcare? In the realm of cybersecurity consulting, the principle of continuity is just as vital and plays a pivotal role in safeguarding organizations from evolving cyber threats.

Read more
CyberWatch
|
3 min read
April 8, 2025

Cloud IAM Best Practices – Simplifying Security Without Compromising Access

Managing access in the cloud can be stressful. Who should be granted access? What if credentials get exposed? Should you err on the side of security or usability? If you work in Identity and Access Management (IAM), you are likely familiar with these stressors. But there’s good news: Following a few key principles can simplify navigating IAM while at the same time strengthening your organization’s security.

Read more

The Latest

Complete Guide to Ransomware Protection
August 1, 2024

Complete Guide to Ransomware Protection

With a countless number of reported ransomware attacks every month, it seems like the cybersecurity industry is losing its battle with cyber-criminals...

Find out more
Healthcare Cybersecurity Enhancement Checklist
March 27, 2024

Healthcare Cybersecurity Enhancement Checklist

Healthcare weathered a massive increase in data breaches during 2023, with more records disclosed than in both 2021 and 2022 combined. HIPAA Journal reported that over 11 million medical records were disclosed in 2023, with most being data breaches from supply-chain vendor vulnerabilities and ransomware.

Find out more
The Power of Cyber Threat Intelligence in Today's Security Landscape
March 9, 2024

The Power of Cyber Threat Intelligence in Today's Security Landscape

Your company may have best-of-breed security solutions by today’s standard, but it may not necessarily be enough to stop the thousands of new and emerging threats introduced every day. To maintain a strong security posture in today’s threat landscape, you need a way to proactively detect new threats so that you can create strategies to stop them.

Find out more
Strengthening Cybersecurity in Small to Mid-Sized Healthcare Companies: Essential Steps to Protect Patient Data
March 9, 2024

Strengthening Cybersecurity in Small to Mid-Sized Healthcare Companies: Essential Steps to Protect Patient Data

According to the US Department of Health and Human Services, cyber criminals unleash 4,000 ransomware attacks daily. Many of these threats target healthcare organizations where they have few staff to mitigate, contain, eradicate and investigate attacks. Ransomware is the most common method by which these devastating cyber attacks are carried out, leaving healthcare organizations with few options, often leading to negative impacts on productivity and revenue.

Find out more
Strengthening Your Cybersecurity: A Surefire Way to Save on Cyber Insurance Premiums
March 9, 2024

Strengthening Your Cybersecurity: A Surefire Way to Save on Cyber Insurance Premiums

If you have ever shopped for cybersecurity insurance, you know that insurance costs depend on a number of factors including the size of your business, number of employees, your industry, and the type of data stored. Another perhaps more significant factor is your current cybersecurity posture, an increasingly objective measure of your susceptibility to malware, phishing, social engineering, or service interruption.

Find out more
Ransomware Blackmail: The Medibank Data Breach and Lessons on Third-Party Vendor Risk
March 9, 2024

Ransomware Blackmail: The Medibank Data Breach and Lessons on Third-Party Vendor Risk

In October 2022, Medibank administrators became aware of suspicious activity on the corporate network environment. Investigations took place, and the initial investigation found that the suspicious traffic was from an external threat including ransomware.

Find out more
Safeguarding Healthcare Data: The Vital Role of Third-Party Risk Management
March 9, 2024

Safeguarding Healthcare Data: The Vital Role of Third-Party Risk Management

Recently, it seems like hospitals and healthcare providers suffer from a data breach every month, many of them due to third-party vendor vulnerabilities. The healthcare industry suffered from another data breach on March 14 when a third-party vendor responsible for managed care administration announced that a hacker stole more than 4.2 million patient records, the biggest breach of 2023 at that time.

Find out more
Protect Your Data, Recognize and Report Phishing
March 9, 2024

Protect Your Data, Recognize and Report Phishing

A recent US Cybersecurity and Infrastructure Security Agency (CISA) survey showed that eight out of ten organizations reported at least one person within their business fell victim to a phishing attack. CISA performed its own penetration test on organizations willing to be tested, and the results confirmed that most businesses are vulnerable to cyber-criminals using social engineering and phishing methods.

Find out more
Mitigating the Impact of Third-Party Data Breaches: A Guide to Incident Response and Risk Management
March 9, 2024

Mitigating the Impact of Third-Party Data Breaches: A Guide to Incident Response and Risk Management

Ever since the SolarWinds hack in 2020, more businesses are aware of the risks third parties bring into their own enterprise environment.

Find out more