The Security Briefing

Breaking Information Risk Management News and Trends
How to improve cloud security and third-party risk management

How to improve cloud security and third-party risk management

The Equifax data breach of 143 million US consumers is a clear example that cybersecurity threats are real, and that the stakes for businesses have never been higher. When risks don’t get addressed immediately, this makes it even more likely to become another Equifax breach, or think of the SolarWinds incident.  All cyber-attacks are damaging to people and the business that gets hit. 

A simple three step guide to creating an incident response plan

A simple three step guide to creating an incident response plan

When businesses neglect to create an incident response plan and they are forced into action due to a security incident, they find themselves inadequately prepared and taking the wrong steps. In this blog post we’ll discuss three simple steps you can take to build an incident response plan that will help your company be prepared for any security incident that may happen.

3 tips on how to better handle remote working cybersecurity risks

3 tips on how to better handle remote working cybersecurity risks

With the increase in remote working, organizations need to be better prepared for cybersecurity risks and vulnerabilities. This means many things, but above all, when focusing on the remote workforce, it means training employees, analyzing software, and ensuring antivirus solutions are deployed on all devices.

Best cybersecurity practices for your remote workforce

Best cybersecurity practices for your remote workforce

Cybersecurity real talk: You train, you give rules, and you understand the habits so that you can break the bad habits in time as you integrate and substitute with cybersecurity culture practices that you make a constant through business day-to-day operational habits. A simple break-down with best cybersecurity practices in mind are the following steps.

Network security with our IPK services

Network security with our IPK services

The value of network security is something every CEO and CIO, or other business executive, is aware of (or should be, one should hope). In one way or another, the executives are always looking to be effective in what they set up. The thing is, to be effective with cybersecurity overall, there is a need to take a holistic approach and to have the knowledge on what’s important, what’s not, what’s smoke in your eyes, and so on.

3 keys to a successful cybersecurity plan for the new year

3 keys to a successful cybersecurity plan for the new year

This year businesses have had to learn how to deal with uncertainty and plan on the fly.  While many executives and their teams have done the best they could, the transition to a predominantly remote workforce puts some new pieces in the forefront when thinking about...

CCPA expands and will be replaced by California Privacy Rights Act

CCPA expands and will be replaced by California Privacy Rights Act

Get ready for CPRA: For executives and security leaders that are keeping an eye out for data privacy compliance regulations, note that the proposition to expand CCPA’s regulations passed on November 3, 2020. The date that you want to mark on your calendars is January 2023. The expansion of CCPA is called the California Privacy Rights Act (CPRA). It is meant to provide the consumer their complete data rights.

M&A cybersecurity due diligence guide for selling or buying a business

M&A cybersecurity due diligence guide for selling or buying a business

With everything that has taken place as a result of COVID-19, a number of businesses have been put in a position of struggle for survival. While there are business owners ready to fight the fight to stay in business, other CEOs and business executives are ready to move on to something else, and to sell their companies. Whether buyer or seller, cybersecurity due diligence for M&A is something of great value for your business.

Bringing to focus SMB cybersecurity needs

Bringing to focus SMB cybersecurity needs

Recent research found that small and medium businesses (SMBs) use free cybersecurity tools for the most part, that one fifth of SMBs have no endpoint security and that almost half of SMBs have no cybersecurity defense plans.  These notions are not new to us, as a...