Cybersecurity is a growing concern for legislators, businesses, and citizens alike. From federal to state-level legislation, laws are being passed that require specific sectors to build a cybersecurity strategy and implement basic cybersecurity norms. Is your business required to comply with any cybersecurity regulations? Some common examples are: Health Insurance Probability and Accountability Act (HIPAA)… Read More »US Cybersecurity Regulations: How Managed Security Operations Center Can Help Your Organization
Watch to learn about threats AEC companies are facing and what they can do to manage the risks of the cybercrime economy.
If you own, operate or manage any type of business in the realm of government contracting — you will not want to miss out on this webinar!
With tax season behind us, it’s time to look at your cybersecurity. Learn more about cybersecurity solutions to protect your company from an attack.
We hear about data breaches and hacks on big companies on a near daily basis and most people assume these cyber-attacks are being conducted by sophisticated actors using complex hacking tools. The truth is; most hacks are quite simple. Hackers are more likely to use the tried and true classic attacks than they are to… Read More »Most Common Industries Targeted by Phishing Attacks
New York State has become the latest in a long line of states to tweak its laws around data breach notifications. On July 19, Capital One suffered one of the biggest data breaches ever. On July 25, New York Governor Andrew Cuomo signed new legislation, the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act) into… Read More »New York Governor Signs Cyber Law After Capital One Breach
It seems as if every week there is another major data breach or cyber-attack in the United States. At this point, almost every person with an online presence has likely had their email and/or password compromised. Many common forms of authentication like multi-factor hardware tokens or employee access badges can be easily lost. Worse still,… Read More »Biometrics: From Your Phone to Your Business
We’ve seen the situation play out countless times. A company falls victim to a cyber-attack and eventually is crippled by the amount it costs to recover. Prominent in this pool of victims are tax professionals and their organizations, who hold data that cyber-criminals are eager to get their hands on: taxpayer information. From Social Security… Read More »A Matter of Taxpayer Safety: How the IRS is Stepping Up to Show the Importance of Cyber-Vigilance
Securing data in the cloud is an often overlooked element of cyber security and the Capital One data breach is a perfect example of how even major corporations can fall victim to attacks on cloud servers. Paige Thompson, a former Amazon Web Services (AWS) systems engineer, took advantage of a misconfigured firewall to pilfer the personal data… Read More »The Capital One Breach Shows the Risks of the Cloud