Our values today or often digital. Managing risk of hacking and digital exploitation is a must for every organization.
Having a prepared out-of-band channel for communicating when your systems can't be trusted is critical to handling a crisis. Here's what to think of when setting up your system.
Supply chain attacks can happen in any business, effectively bypassing all your security controls and awareness programs. Learn how to defend against these "out-of-band" attacks on people and technologies.
Cybersecurity is important for every company. It is a field that spans both people and technologies. Most companies that are trying to build an internal "security culture" or make "compliance" part of their everyday operations feel some level of conflict, and sometimes to the point where people are refusing to follow cybersecurity policies, or even … Continue reading Why people don’t comply with your cybersecurity policies
The people on the inside of our organizations are sometimes the biggest risk. Insiders who leak data, sell data or sabotage operations are hard to stop because they have legitimate access to the assets we are trying to protect. How can we handle this then? Technology for stopping insiders can be useful - but computer … Continue reading Human friendly insider threat management