
Bite Size Security Blog
Always stay on top of cybersecurity trends, news about risks and regulations with the latest strategies that simplify your approach to dealing with them.
Blog
Breaking information risk management news and trends

Latest Updates
How to measure 3rd party risk in an organization’s supply chain
In a post-pandemic world, the importance of measuring and quantifying 3rd party risk in an organization’s supply chain cannot be overstated. Cybersecurity is not just about protecting your own data; it also means understanding how to keep all the information that flows through your business secure. This includes vendors you work with on a daily basis, like those that provide IT services or provide raw materials for manufacturing processes.
Vendor risk management scoring
When you are clear on how important security is to stay in business and close business deals, you start evaluating vendors and their ability to manage risks. Furthermore, as a company that also cares about the success of your business, you are prepared to do the same with your company’s security.
How cybersecurity costs help businesses grow revenues
If you want to grow business revenues, there is no better way to do that than with spending on your cybersecurity posture. Even though the revenue growth is not an exact number, if we want to speculate with numbers in mind, the first thing that is clear is that cybersecurity affects your bottom line.
Cybersecurity costs under the microscope
Today we’re taking a closer look at cybersecurity costs, cyber attack costs, and how business executives can prioritize their budget to ensure their business is protected and that the gap for optimal security for different business sizes is closed. The ability to prepare security spending in a focused manner ensures that an effective security posture is accessible to small businesses and bigger businesses alike.
DEFCON cybersecurity highlights for business executives
To keep business executives on top of cybersecurity news in a way that benefits operations and cyber readiness, we’re sharing some highlights from the DEF CON 29, aka DEFCON, conference with pointers that get you to take action or think about what’s next for your cybersecurity posture. Also, as cybersecurity professionals engage more and more with cybersecurity issues that affect business, the annual DEFCON conference has become an important event for cybersecurity education.
BHUSA cybersecurity highlights for business executives
Staying on top of cybersecurity topics takes place for business executives through many sources, including cybersecurity focused events such as Black Hat and DEFCON. This year’s Black Hat event just concluded and there are some highlights that are optimal to add to your arsenal of information in an effort to continue along your cyber resiliency strategy and approach.
Spotting the warning signs of data breach
When you realize that data breaches can take your business down and you might not even know it, you start to take action on cybersecurity. You also read up on cyber news and data breach costs to get a clear idea of what you’re up against.
Cyber resilience – Understanding supply chain cyber attacks
The methods of attack by hackers keep expanding, supply chain cyber attacks being one of the most recent that are presenting a major threat to businesses. So, what are supply chain attacks and how can businesses secure against them? Let’s start with what and go from there.
The impact of ransomware on cyber insurance
A closer look at the impact of ransomware on cyber insurance shows how rates and requirements are changing due to the increase in these types of attacks, as well as why being cyber ready isn’t about having cyber insurance.
Cyber ready – Why security assessments are key
A security assessment is often a difficult task to conduct. The workforce needs to be skilled and trained on the tools, techniques, and procedures of the organization’s risk management strategy.
Cyber ready – Keep your company safe from cyber threats
The cyber world is an ever-changing landscape. It’s a place where people are constantly trying to get their hands on your data, and businesses need to be prepared for the onslaught of attacks that come with it.
Protect against phishing attacks involving file sharing programs
Phishing attacks are an all-too-common occurrence in today’s business world. Hackers use phishing scams to trick employees into giving up company information, passwords and other sensitive data. The phishers often send out emails that appear as if they come from the CEO or another high-level exec…
3 effective ways to improve cloud security with a remote workforce
Cloud security is an increasingly top priority for companies and for the right reasons. Cyber threats have more than doubled with a remote workforce environment, working from home gives hackers easy access depending on network, VPN and the lack of a security executive nearby to guide you…
Make your remote workforce safer with cyber awareness training and micro-learning
It seems that every day, our work environment continues to get more dependent on technology. For example, just take a look at your office computer screen and notice all the apps you need to run your job from one central location. As more employees find themselves working remotely, and with such easy access to information utilizing the Internet from home, cyberattacks have become a major concern.
The Executive Order on improving cybersecurity
The Executive Order (EO) on improving the nation’s cybersecurity to support public and private efforts, will help identify, deter, protect against, detect, and respond to persistent and increasingly sophisticated malicious cyber campaigns. What has influenced some of the specific measures used in the Executive Order are the recent cyber espionage campaigns.
Cyber Resilience: How to plan for the unknown
Cyber resilience gets businesses to prepare for, respond to, and recover from cyber threats. For it to work you want your IT and security teams to have actionable data on everything in the network, not just the devices and applications that employees use every day. To set this up you need to plan up-front and have model scenarios that can tell you how your data would be accessed.
How to improve cloud security and third-party risk management
The Equifax data breach of 143 million US consumers is a clear example that cybersecurity threats are real, and that the stakes for businesses have never been higher. When risks don’t get addressed immediately, this makes it even more likely to become another Equifax breach, or think of the SolarWinds incident. All cyber-attacks are damaging to people and the business that gets hit.
A simple three step guide to creating an incident response plan
When businesses neglect to create an incident response plan and they are forced into action due to a security incident, they find themselves inadequately prepared and taking the wrong steps. In this blog post we’ll discuss three simple steps you can take to build an incident response plan that will help your company be prepared for any security incident that may happen.
Phishing Exercises – Preventing businesses from falling for deceptive messages
Learn how to protect your employees and business against phishing, deceptive messages, and other malicious attacks. NCX Group will help you identify the right training exercises and security awareness programs that will mitigate the risk of your company being compromised by cyber criminals.
3 tips on how to better handle remote working cybersecurity risks
With the increase in remote working, organizations need to be better prepared for cybersecurity risks and vulnerabilities. This means many things, but above all, when focusing on the remote workforce, it means training employees, analyzing software, and ensuring antivirus solutions are deployed on all devices.
Don't Be Shy.. Get In Touch.
If you are interested in working together, send us an inquiry and we will get back to you!