Cybersecurity

Security Consultant shares insight to respond to cloud incidents

Cybersecurity digest: Ransomware, social engineering, and MFA negligence

The following article on recent cybersecurity news and events was written by Kalles Group Security Consultant, Jayanth Kumar. This content appears in our monthly email Security Digest, which unpacks recent security incidents and details what you should know, and what you should do.   Ransomware Resurgence: A Ticking Time Bomb   What you need to …

Cybersecurity digest: Ransomware, social engineering, and MFA negligence Read More »

Security Consultant shares insight to respond to cloud incidents

Cybersecurity digest: NIST’s Cybersecurity Framework 2.0

The following article on recent cybersecurity news and events was written by Kalles Group Security Consultant, Jayanth Kumar. This content appears in our monthly email Security Digest, which unpacks recent security incidents and details what you should know, and what you should do.   NIST’s Cybersecurity Framework 2.0: Navigating the Enhanced Landscape The National Institute …

Cybersecurity digest: NIST’s Cybersecurity Framework 2.0 Read More »

Group of company executives having a chat, showcasing the impact of storytelling for businesses

6 Tips to resolve common SMB security challenges

I’m always concerned when I hear about small and medium sized businesses (SMBs) cutting back on their cybersecurity budget to help save on business costs. Don’t get me wrong – I fully understand businesses’ need to control costs. But controlling costs doesn’t have to mean giving up on proper cybersecurity; some creative solutioning can help …

6 Tips to resolve common SMB security challenges Read More »

Data Security-securing your critical data

Data security: 4 ways to secure your critical data

During the second quarter of 2023, a staggering 110 million accounts were compromised, marking a significant increase compared to the initial quarter’s 43.2 million breaches. To provide perspective, this surge translates to an alarming rate of 855 accounts being compromised every minute during the second quarter, in contrast to the previous quarter’s rate of 334 …

Data security: 4 ways to secure your critical data Read More »

A Log4j retrospective

It was reported that 2021 was a  record year for zero-day exploits, and to many it has felt like a non-stop string of resource- and risk-intensive vulnerabilities to remediate. The Log4j exploit seemed to get more attention than others because of its pervasiveness in organizations, regardless of size or industry. While many articles, blogs, and …

A Log4j retrospective Read More »

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning …

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Infosec leader evaluating various information security frameworks for his organization's needs.

Which information security framework is right for my business?

Choosing the appropriate information security framework for your organization is important in protecting confidential or sensitive data, systems, and overall cyber resilience. With increasing regulatory requirements and an ever-evolving threat landscape, it is vital to devise a structured approach for safeguarding your assets and effectively managing your cyber risks. The right information security framework provides …

Which information security framework is right for my business? Read More »

decentralizing the security of digital transformation and industry 4.0

How to secure digital transformation initiatives

Securing digital transformation is paramount in today’s fast-paced technological landscape. As organizations embark on digitalization journeys, they open new doors to efficiency, agility, and innovation. However, this transformation also unveils an array of cybersecurity challenges. This article will dive deep into the critical intersection of digital transformation and cybersecurity. We’ll explore how businesses can navigate …

How to secure digital transformation initiatives Read More »

cybersecurity tips to secure your devices and privacy while working from home. WFH connectivity

8 cybersecurity tips for WFH connectivity

The shift toward remote work has accelerated dramatically, with more people than ever working from home (WFH). While this transformation offers flexibility and convenience, it also brings new challenges, particularly cybersecurity.  Statista’s Cybersecurity Outlook predicts that cybercrime will significantly increase global costs in the next five years. The estimate indicates a climb from $8.44 trillion …

8 cybersecurity tips for WFH connectivity Read More »

Image of a remote worker working on a laptop with a focus on cybersecurity policy implementation.

Remote Work Cybersecurity Policy Essentials

Have you updated your remote work cybersecurity policy? We recently received a notice from one of our clients today detailing their expectations for vendors visiting their locations. I think about other policies that may need updating for the times. For instance, do your cybersecurity policies, standards, and procedures address remote work? If not, now is …

Remote Work Cybersecurity Policy Essentials Read More »

Success Story: Navigating the threat landscape with Kalles Group

Security success: Navigating the threat landscape

In this ever-dynamic technology landscape, data drives business success, and cybersecurity has never been more critical. Small and mid-sized businesses (SMBs) are not immune to the ever-evolving threat landscape, making it imperative to be well-informed and proactive in protecting their digital assets. Recently, our team hosted an interactive webinar featuring Glen Wills, Kalles Group’s Practice …

Security success: Navigating the threat landscape Read More »