Tag Archives: Cyber Security

Need-to-Know GDPR Terminology for Compliance Success- Part 2

GDPR Terminology

GDPR from A-Z Organizations worldwide are scrambling to meet GDPR compliance before the regulation takes effect on May 25th of this year (2018). Other still aren’t taking it seriously enough. Hopefully, you’re here because your organization is committed to taking the necessary steps towards GDPR compliance. If you’re just beginning… Read more »

A Simple Journey to GDPR Compliance: Data Reporting

GDPR data reporting

  A Simple Journey to GDPR Compliance: Data Reporting So, you’re trying to make sense of these new data protection regulations being implemented by the European Union. Breaking down your compliance process into steps can help make the task a little easier.  By now you should have discovered the data… Read more »

2018 Top 5 Cyber Security Predictions: Attacks, Regulations and Innovation

We’re about mid-way through January of 2018, which means that it’s about time I follow up on my new tradition of sharing my top cyber security predictions of the new year! Check out last year’s predictions. The Big Four: 2017 Cyber Security Predictions   This year, in many ways, shares… Read more »

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Securing Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility + Security… Read more »

Drafting Cyber Security Policy for your Company

cyber security policy

Drafting Cyber Security Policy for your Company The aspects you need to cover when drafting or updating your company’s cyber security policy- from employee responsibilities to federal compliance policies. Drafting cyber security policy for your company can seem an overwhelming task. There is so much to cover and it all… Read more »

Why Train Employees in Cyber Security?

train employees in cyber security

Why Train Employees in Cyber Security? Cyber security is often an afterthought for businesses, and this can be detrimental. Many companies don’t provide cyber security awareness training to employees, nor their IT teams in the technical aspects. Those that do, rarely follow up that training going forward. Cyber security is… Read more »

Women in Tech: National Cyber Security Organizations

National Cyber Security Organizations

Women in Tech: National Cyber Security Organizations After working with Women in Cyber Security (WiCyS) recently, as a sponsor of their yearly conference, I was curious about what other great organizations were making similar efforts to champion women in the information security and privacy field. As I began my search, I… Read more »

#CyberHeadlines: When your VPN is out to get you

#CyberHeadlines

#CyberHeadlines: When your VPN is out to get you Nicholas Deleon, writer at Motherboard, posted an article last week about a cyber fraud that targeted him recently. The story is perplexing, and comically written, and is a fun read (I recommend it). Deleon’s speculative reasoning suggests that new legislation allowing… Read more »

#CyberHeadlines: Operation Cloud Hopper- APT10 Hacks Target MSPs

hacks target msps

#CyberHeadlines: Operation Cloud Hopper- APT10 Hacks Target MSPs A new report from the National Cyber Security Centre (NCSC), in conjunction with BAE systems and PwC, details what they refer to as “one of the largest ever sustained global cyber espionage campaigns”. Using custom malware and spear phishing, Chinese hacker group… Read more »

#CyberHeadlines: Sophisticated Cyber Bank Thievery

#CyberHeadlines: Sophisticated Cyber Bank Thievery Last week, Kaspersky uncovered the first known case of “wholesale bank fraud”. Targeting 36 Brazilian banking sites last year, hackers changed the DNS (Domain Name System) registrations, controlling the bank’s website domains to direct users to phishing sites. It is believed that at the same… Read more »