Information Security

Data operators discussing GDPR and data privacy-related issues

3 trends shaping data privacy in 2024

Text, email, Slack messages, Instagram DM, video game chats, asking Siri how to get to the dentist: Digital interactions are woven into the fabric of daily life. But this means heaps of information are being shared at all times, and the management of that data is hypercomplex. Over the next year, evolving AI technology, transforming […]

3 trends shaping data privacy in 2024 Read More »

Businesses pay $1.1 Billion in ransom to hackers: How to safeguard yours

Businesses pay $1.1 Billion in ransom to hackers: How to safeguard yours

Hackers held the spotlight in the news over the past few days as they threatened to release documents related to the Trump trial. This is far from an isolated incident — ransom demands related to cybercrimes have seen a surge since last year, targeting businesses, individuals, and even governments. These attacks have resulted in data

Businesses pay $1.1 Billion in ransom to hackers: How to safeguard yours Read More »

94% of firms hit by phishing attacks in 2023 as AI sharpens scam tactics

94% of firms hit by phishing attacks in 2023 as AI sharpens scam tactics

Phishing scams, which aim to trick victims into revealing personal information or clicking malicious links, have long been a thorn in the side of individuals and businesses alike. However, the emergence of generative artificial intelligence has transformed these scams from mere nuisances into sophisticated threats capable of causing significant financial damage and emotional distress. Recent

94% of firms hit by phishing attacks in 2023 as AI sharpens scam tactics Read More »

When’s the best time to invest In cybersecurity? Before you need It.

When’s the best time to invest In cybersecurity? Before you need It.

Cybercrime was ranked as the top risk to businesses in 2024 by the Allianz Risk Barometer survey. As cybercriminals get smarter and more creative with the help of AI, the threats to businesses are becoming more difficult to avoid. Yet the default approach by many businesses is to be reactive, implementing protective measures after the

When’s the best time to invest In cybersecurity? Before you need It. Read More »

Cybersecurity digest: The Microsoft-Open AI report, U.S. govt’s stance on spyware, and Clorox’s teachable moment

Cybersecurity digest: The Microsoft-Open AI report, U.S. govt’s stance on spyware, and Clorox’s teachable moment

AI in the hands of bad actors is everyone’s nightmare. But we take heart in the fact that Microsoft and OpenAI are working together to understand and curb the ways that threat actors could misuse AI and LLMs. The U.S. government is also stepping up to protect people from technology used for nefarious purposes —

Cybersecurity digest: The Microsoft-Open AI report, U.S. govt’s stance on spyware, and Clorox’s teachable moment Read More »

Corporate boards take note: The 2023 SEC rules for cyber disclosure have teeth

Corporate boards take note: The 2023 SEC rules for cyber disclosure have teeth

SEC tightens cybersecurity rules in 2023 2023 saw Federal authorities ratcheting down on Cybersecurity. In July, the U.S. Security and Exchange Commission [SEC] issued the latest final rules that enhance the SEC’s cybersecurity disclosure requirements. The new SEC Rules: Holding corporate boards accountable While this has been a topic of concern since cybercrime began to

Corporate boards take note: The 2023 SEC rules for cyber disclosure have teeth Read More »

Journey to CMMC

Introduction to NIST 800-171 cybersecurity framework The National Institute of Standards and Technologies issued NIST Special publication 800-171 cybersecurity framework to provide guidance, deliver requirements, and set expectations for Federal contractors and suppliers doing business with the Department of Defense (DOD). NIST 800-171 vs NIST 800-53 NIST 800-171 consists of 171 security controls that cover

Journey to CMMC Read More »

Cybersecurity digest 2023: a year in review

This content appears in our monthly email Security Digest, which unpacks recent security incidents, detailing what you should know, and what you should do. Sign-up to receive this digest below.   As the sun sets on 2023, it’s time for a retrospective glance at the cybersecurity landscape that has both challenged and advanced our industry

Cybersecurity digest 2023: a year in review Read More »

Cybersecurity digest: Ransomware, social engineering, and MFA negligence

The following article on recent cybersecurity news and events was written by Kalles Group Security Consultant, Jayanth Kumar. This content appears in our monthly email Security Digest, which unpacks recent security incidents and details what you should know, and what you should do.   Ransomware Resurgence: A Ticking Time Bomb   What you need to

Cybersecurity digest: Ransomware, social engineering, and MFA negligence Read More »

Cybersecurity digest: NIST’s Cybersecurity Framework 2.0

The following article on recent cybersecurity news and events was written by Kalles Group Security Consultant, Jayanth Kumar. This content appears in our monthly email Security Digest, which unpacks recent security incidents and details what you should know, and what you should do.   NIST’s Cybersecurity Framework 2.0: Navigating the Enhanced Landscape The National Institute

Cybersecurity digest: NIST’s Cybersecurity Framework 2.0 Read More »

Businesses pay $1.1 Billion in ransom to hackers: How to safeguard yours

Data security: 4 ways to secure your critical data

During the second quarter of 2023, a staggering 110 million accounts were compromised, marking a significant increase compared to the initial quarter’s 43.2 million breaches. To provide perspective, this surge translates to an alarming rate of 855 accounts being compromised every minute during the second quarter, in contrast to the previous quarter’s rate of 334

Data security: 4 ways to secure your critical data Read More »

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation