Cybersecurity is important for every company. It is a field that spans both people and technologies. Most companies that are trying to build an internal "security culture" or make "compliance" part of their everyday operations feel some level of conflict, and sometimes to the point where people are refusing to follow cybersecurity policies, or even … Continue reading Why people don’t comply with your cybersecurity policies
The people on the inside of our organizations are sometimes the biggest risk. Insiders who leak data, sell data or sabotage operations are hard to stop because they have legitimate access to the assets we are trying to protect. How can we handle this then? Technology for stopping insiders can be useful - but computer … Continue reading Human friendly insider threat management
Consumers are becoming conscious of privacy. This is not a new problem, an Epic report from 2002 claimed annual lost sales due to privacy concerns could be as much as USD 18 billion. The situation today is probably much worse after Cambridge Analytica, Snowden and the attention brought to the masses through New legislation such … Continue reading How to build consumer trust in your privacy practices
Incident response is difficult for many small businesses. Here's a practical approach to defining a working playbook when there is no specialist team to take care of cyber attacks for you.
SIPOC cyber is a structured process for mapping information assets to business processes. Get a free template and get started today!