insights.jpg
Oct
11
2017

#CyberAware Month: Cyber Security Professionals

By April Resnick

Who’s responsible for your organization's security? With cyber threats on the rise, you must consider if your employees are properly trained to secure your organization. This goes hand in hand with assessing the effectiveness of your cyber security program as a whole. 

Read More
Oct
04
2017

Hello October! National Cyber Security Awareness Month

By LaShawn Douglas

We are welcoming October with the celebration of National Cyber Security Awareness Month! This month, we along with other champions, will help promote online safety awareness and push education initiatives.  #NCSAMChampion

As we begin to think think about cyber security, protecting your organization’s infrastructure comes to mind.

Read More
Sep
20
2017

Deep Dive: Developing An Insider Threat Program

By Greg Cullison

How confident do you feel about your company's ability to fight insider threat? Are your employees human beings who make mistakes? If so, you must consider putting in place a comprehensive insider threat program -- whether you're required to do so or not. How, you ask? Read on to learn how our insider threat experts got results for a global management consulting firm.

Read More
Sep
13
2017

Major Pitfalls That Will Sink Your Personnel Security Program

By LaShawn Douglas

Before your organization makes a mistake that is too costly to recover from – it’s important to identify and avoid those common pitfalls. Our experts have gathered the following resources to help you recognize and avoid the simple mistakes your company could be making that result in an increased insider threat risk.

Read More
Jul
26
2017

Fear Factor – Can You Face Your Cyber Security Fears?

By Greg Cullison


Fear Factor is the competition reality series in which contestants must decide if they have the guts and determination to face their fears while outpacing the competition. It’s important to take that same approach when looking at your organization's cyber security defense. The normal cyber security approach assumes that building higher walls will keep the bad guys away from the crown jewels of the castle. Instead, you must outpace the competition and assume your network is already penetrated. Not just penetrated from outside, but from also from within.

Read More