888-448-5451 [email protected]

Bite Size Security Blog

Always stay on top of cybersecurity trends, news about risks and regulations with the latest strategies that simplify your approach to dealing with them.

Blog

Breaking information risk management news and trends

Latest Updates

DEFCON cybersecurity highlights for business executives

DEFCON cybersecurity highlights for business executives

To keep business executives on top of cybersecurity news in a way that benefits operations and cyber readiness, we’re sharing some highlights from the DEF CON 29, aka DEFCON, conference with pointers that get you to take action or think about what’s next for your cybersecurity posture. Also, as cybersecurity professionals engage more and more with cybersecurity issues that affect business, the annual DEFCON conference has become an important event for cybersecurity education.

read more
BHUSA cybersecurity highlights for business executives

BHUSA cybersecurity highlights for business executives

Staying on top of cybersecurity topics takes place for business executives through many sources, including cybersecurity focused events such as Black Hat and DEFCON. This year’s Black Hat event just concluded and there are some highlights that are optimal to add to your arsenal of information in an effort to continue along your cyber resiliency strategy and approach.

read more
Spotting the warning signs of data breach

Spotting the warning signs of data breach

When you realize that data breaches can take your business down and you might not even know it, you start to take action on cybersecurity. You also read up on cyber news and data breach costs to get a clear idea of what you’re up against.

read more
Make your remote workforce safer with cyber awareness training and micro-learning

Make your remote workforce safer with cyber awareness training and micro-learning

It seems that every day, our work environment continues to get more dependent on technology. For example, just take a look at your office computer screen and notice all the apps you need to run your job from one central location.  As more employees find themselves working remotely, and with such easy access to information utilizing the Internet from home, cyberattacks have become a major concern.

read more
The Executive Order on improving cybersecurity

The Executive Order on improving cybersecurity

The Executive Order (EO) on improving the nation’s cybersecurity to support public and private efforts, will help identify, deter, protect against, detect, and respond to persistent and increasingly sophisticated malicious cyber campaigns. What has influenced some of the specific measures used in the Executive Order are the recent cyber espionage campaigns.

read more
Cyber Resilience: How to plan for the unknown

Cyber Resilience: How to plan for the unknown

Cyber resilience gets businesses to prepare for, respond to, and recover from cyber threats. For it to work you want your IT and security teams to have actionable data on everything in the network, not just the devices and applications that employees use every day.  To set this up you need to plan up-front and have model scenarios that can tell you how your data would be accessed.   

read more
How to improve cloud security and third-party risk management

How to improve cloud security and third-party risk management

The Equifax data breach of 143 million US consumers is a clear example that cybersecurity threats are real, and that the stakes for businesses have never been higher. When risks don’t get addressed immediately, this makes it even more likely to become another Equifax breach, or think of the SolarWinds incident.  All cyber-attacks are damaging to people and the business that gets hit. 

read more
A simple three step guide to creating an incident response plan

A simple three step guide to creating an incident response plan

When businesses neglect to create an incident response plan and they are forced into action due to a security incident, they find themselves inadequately prepared and taking the wrong steps. In this blog post we’ll discuss three simple steps you can take to build an incident response plan that will help your company be prepared for any security incident that may happen.

read more
Best cybersecurity practices for your remote workforce

Best cybersecurity practices for your remote workforce

Cybersecurity real talk: You train, you give rules, and you understand the habits so that you can break the bad habits in time as you integrate and substitute with cybersecurity culture practices that you make a constant through business day-to-day operational habits. A simple break-down with best cybersecurity practices in mind are the following steps.

read more
Network security with our IPK services

Network security with our IPK services

The value of network security is something every CEO and CIO, or other business executive, is aware of (or should be, one should hope). In one way or another, the executives are always looking to be effective in what they set up. The thing is, to be effective with cybersecurity overall, there is a need to take a holistic approach and to have the knowledge on what’s important, what’s not, what’s smoke in your eyes, and so on.

read more

Don't Be Shy.. Get In Touch.

If you are interested in working together, send us an inquiry and we will get back to you!