Information Security

Cybersecurity digest: NIST’s Cybersecurity Framework 2.0

The following article on recent cybersecurity news and events was written by Kalles Group Security Consultant, Jayanth Kumar. This content appears in our monthly email Security Digest, which unpacks recent security incidents and details what you should know, and what you should do.   NIST’s Cybersecurity Framework 2.0: Navigating the Enhanced Landscape The National Institute […]

Cybersecurity digest: NIST’s Cybersecurity Framework 2.0 Read More »

Businesses pay $1.1 Billion in ransom to hackers: How to safeguard yours

Data security: 4 ways to secure your critical data

During the second quarter of 2023, a staggering 110 million accounts were compromised, marking a significant increase compared to the initial quarter’s 43.2 million breaches. To provide perspective, this surge translates to an alarming rate of 855 accounts being compromised every minute during the second quarter, in contrast to the previous quarter’s rate of 334

Data security: 4 ways to secure your critical data Read More »

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threats are becoming more severe with the widespread use of remote technologies and the increasing sophistication of attacks. Recent analyses indicate that attackers are exploiting vulnerabilities at unprecedented speeds. In 2023, the average time to exploit a vulnerability after public disclosure decreased to just five days, a significant reduction from 32 days in 2022.

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Which information security framework is right for my business?

Which information security framework is right for my business?

Which Information Security Framework is Right for My Business? Picking the right security framework is important to protect your organization’s sensitive information and systems. With so many threats and regulations to think about, it’s important to have a plan in place to reduce risks and meet compliance requirements. A security framework provides step-by-step guidelines to

Which information security framework is right for my business? Read More »

Discover the intersection of artificial intelligence and cyber security. Explore risks, opportunities, and strategies for safeguarding your organization.

How to secure digital transformation initiatives

Securing digital transformation is paramount in today’s fast-paced technological landscape. As organizations embark on digitalization journeys, they open new doors to efficiency, agility, and innovation. However, this transformation also unveils an array of cybersecurity challenges. This article will dive deep into the critical intersection of digital transformation and cybersecurity. We’ll explore how businesses can navigate

How to secure digital transformation initiatives Read More »

8 cybersecurity tips for WFH connectivity

The shift toward remote work has accelerated dramatically, with more people than ever working from home (WFH). While this transformation offers flexibility and convenience, it also brings new challenges, particularly cybersecurity.  Statista’s Cybersecurity Outlook predicts that cybercrime will significantly increase global costs in the next five years. The estimate indicates a climb from $8.44 trillion

8 cybersecurity tips for WFH connectivity Read More »

Remote Work Cybersecurity Policy Essentials

Have you updated your remote work cybersecurity policy? We recently received a notice from one of our clients today detailing their expectations for vendors visiting their locations. I think about other policies that may need updating for the times. For instance, do your cybersecurity policies, standards, and procedures address remote work? If not, now is

Remote Work Cybersecurity Policy Essentials Read More »

Security Success: Navigating the Threat Landscape

In this ever-dynamic technology landscape, data drives business success, and cybersecurity has never been more critical. Small and mid-sized businesses (SMBs) are not immune to the ever-evolving threat landscape, making it imperative to be well-informed and proactive in protecting their digital assets. Recently, our team hosted an interactive webinar featuring Glen Wills, Kalles Group’s Practice

Security Success: Navigating the Threat Landscape Read More »

4 tips to improve remote workforce cybersecurity

The surge in cybersecurity threats stemming from remote work is undeniably substantial. Gitnux reports that a significant 66% majority of organizations acknowledge that remote work has amplified these risks. Furthermore, 90% of data breaches are attributed to human errors, while 60% of remote workers admit to using unsecured devices for their work-related tasks. These statistics

4 tips to improve remote workforce cybersecurity Read More »

Replaying security: From manual test requests to test scripts

Kalles Group Pen Tester Stan Steenhuis, describes how the investment in constructing custom test requests can be turned into repeatable scripted tests. By adding this process into your pen testing methodology, you can easily develop your existing custom test collection and empower other pen testers on your team to perform these tests. Discovering a significant

Replaying security: From manual test requests to test scripts Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation