Kalles/Group Articles

Useful Information

Resources

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning…

Read More...

Save millions by upskilling your staff

How we helped a client save $2.5M by upskilling their staff Through small, strategic tech tips, our client was able to save at least $2.5 million annually, while creating a faster, more tech-savvy workforce. Capturing the ROI of a training program often feels elusive. Counting the number of “butts in seats” only refers to people…

Read More...

3 reasons why the Colonial pipeline hack is important

Colonial Pipeline, which carries roughly 45% of fuel consumed on the East Coast (per the WSJ), was shutdown on May 7th due to a cyber-attack. At time of writing, Colonial’s systems remain shutdown and Colonial is working to restore operations as researchers assess the damage. This is the biggest ransomware attack to date against United…

Read More...

How to visualize a security program

How to visualize a security program (in a way that is not overwhelming) It can be daunting to know how to properly secure your organization from the numerous risks that it faces. In the past, a business would simply need to lock up each night, but modern times have proven that information security breaches are…

Read More...

Which information security framework is right for my business?

There is no one-size-fits-all solution when it comes to information security frameworks and guidelines. Understanding all of the different security and risk frameworks can be daunting. This is a simplified guide intended to help you understand the basics of different information security frameworks, why you might need them, and how to go about choosing the…

Read More...

Navigating digital transformation & cybersecurity

The digital transformation wave is here, we’re in the middle of it, and cybersecurity needs to adapt matching the urgency, pace, and the delivery of new or improved digital products. Businesses are transforming across industries, focused on improving the quality and engagement of customer-facing products. cybersecurity needs to be a pressing concern that is ultimately…

Read More...

Data privacy- how to make it practical

How to make data privacy practical Learning how to make data privacy skills practical can lead to better outcomes for your organization. What actions are you taking to move beyond simple data privacy awareness and actually start applying data privacy principals? Below are 3 practical examples of how you can move from awareness to skill-building…

Read More...

Cybersecurity for your home

Security in your home might be a daily activity for you – keeping the kids, the dog, and the secret stash of chips safe. But what about your digital security (or cybersecurity), including precious details about you and your family? The addition of more work and school happening at home makes cybersecurity an even higher…

Read More...
Derek Kalles profile photo

New identity. Same focus.

Welcome to our new brand! You will see that our look has changed, but our commitment, level of service, and offerings have not. We took a moment to pause in the midst of the crazy that is 2020 to do some soul-searching; we dug into our history and our message. As we did, we recognized…

Read More...
a diagram of devices connected to each other

Cybersecurity tips for WFH connectivity

Since we are in the new normal, it is a good idea to adopt your own security practices. Here are a couple of tips to help you navigate cybersecurity in the new work environment. Routers In addition to the usual good security practices like strong passwords, never posting your password on a sticky note on…

Read More...

Have you updated your cyber policies for remote work?

We received a notice from one of our clients today detailing their expectations for vendors visiting their locations in this time of pandemic. It made me think about other policies that may need updating for the times. For instance, do your cybersecurity policies, standards, and procedures address remote work? If not, now is a good…

Read More...
virtual-customer-onboarding

Can virtual customer onboarding beat the onsite experience?

For most companies in the throes of the 2020 COVID pandemic, there’s no question of whether to onboard customers virtually. You may be thinking of virtual customer onboarding as a short-term fix, a band aid while you’re waiting to switch back to onsite onboarding when circumstances allow.  That sounds like smart business. But is it?   Even when onsite onboarding is possible again, you may want to continue virtual delivery…

Read More...