Jun 10, 2022 | Cybersecurity & Risk Management, Technology
One of the age-old discussions in the realm of cybersecurity is the trade-off between security and usability. It is often said ‘a step forward in security is a step backward in usability’. While it is true cybersecurity will always require some level of...
Apr 13, 2022 | Cybersecurity & Risk Management, Technology
The technology and approach behind a cyberattack evolve daily, making you and your organization extremely vulnerable. But one thing is certain – weak security has a cost. Cyberattacks will manipulate and disable the critical infrastructure we depend on to live,...
Jan 28, 2022 | Technology, Cybersecurity & Risk Management, Cybersecurity Bulletin
Data Privacy Day is the international holiday to acknowledge the importance of data security for sensitive and personal information. And this year we’re recommending you take a few minutes of your day and reflect on how your organization handles sensitive data....
Jan 25, 2022 | Technology, Cybersecurity & Risk Management, Resources
Authentication is one of the pillars of cybersecurity. Nevertheless, weaknesses in its mechanism, or in the process around authentication, are still a common root cause for organizations of all sizes falling prey to online attacks. In 2021 alone, countless...
Dec 7, 2021 | Technology, Cybersecurity & Risk Management
How Vulnerable Are You to A Cyberattack? The short answer – extremely vulnerable if left unchecked. The technology and approach behind a cybersecurity attack evolves daily, putting everyone at risk. Equally concerning is the malicious intent behind...
Aug 4, 2021 | Cybersecurity & Risk Management, Technology
Risk can’t be avoided in today’s business world – but it can be mitigated. Most businesses rely on a range of third-party services and applications. The good news is that these services can help an organization work better, faster, and more economically. The bad news...