7 Ways COVID-19 Will Permanently Reshape Cyber Security

7 Ways COVID-19 Will Permanently Reshape Cyber Security Many security projects—no matter how important—fade away, either due to budget limitations, scarce resources or lack of prioritization. However, the sudden shift to remote work due to the COVID-19 pandemic has pushed many of these initiatives to the forefront, and they are now gaining traction that should […]

Protecting Your Business from COVID-19-related Phishing Scams

Three Phases of AttacksIn recent weeks, there has been an explosion of COVID-19-themed phishing schemes. The first phase started toward the end of February and into early March. These mainly involved spoofs of the CDC (Centers for Disease Control), WHO (World Health Organization), and a few other reputable authorities including HR departments within targeted organizations. […]

Keys to Managing Your Third-Party Cyber Risk During a Pandemic

Organizations are increasingly partnering with an expansive network of third parties to extend and optimize their capabilities. By leveraging these external partners, organizations are better positioned to grow and compete in their respective markets. These third parties can be suppliers, contractors, vendors, business partners or joint ventures that organizations rely on to enhance their business […]

Coronavirus (COVID-19) and the Challenges Facing Cyber Security

Coronavirus (COVID-19) and the Challenges Facing Cyber Security By now, many experts agree that repercussions from the coronavirus will hit every organization on some level, no matter how resilient they thought they were. In fact, cyber security author Raef Meeuwisse has said that “no single event to date has changed the tech threat landscape more […]

Why You Need Next Generation Third-Party Cyber Risk Management

Why You Need Next Generation Third-Party Cyber Risk Management In this digital age, assessing cyber risk is critical to businesses of all sizes. And not just your organization’s direct risk level but those of all the third parties you do business with. This assessment is often surfaced through a score. Undoubtedly, that cyber risk score […]