Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall
Posted by William Pate
October 31, 2017 8:59 AM
Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognize. The cyber thug behind the message made a myriad of threats – including physical harm to district students and staff and releasing their personal information – unless a ransom was paid in Bitcoin. The community was thrust into a panic, and the district closed its 30 schools for three days. Was this response warranted or appropriate?
Topics: Information Governance, cybersecurity, Ransomware, Cybercrime, Information Security
Did you know that this month is National Cybersecurity Awareness Month?
Topics: Information Governance, cybersecurity, Hacking, Cybercrime, Information Security
Posted by William Pate
September 22, 2017 9:23 AM
by Richard Forno, University of Maryland, Baltimore County
Story republished from The Conversation.
Topics: Information Governance, cybersecurity, Hacking, Cybercrime, Information Security
Posted by William Pate
September 15, 2017 9:49 AM
Many thanks to our friends at iManage for sharing this blog post.
by Aaron Rangel, Director Product Marketing, iManage
The secret is out: professional services firms make attractive targets because they have large volumes of privileged client information. High profile cyber-attacks such as the Panama Papers incident have made information security a top priority at the C-level executive suite.
Topics: iManage, Information Governance, cybersecurity, Information Security
ISACA (formerly the Information Systems Audit and Control Association), an organization comprised of IT governance professionals, recently released its annual global cybersecurity study, State of Cyber Security 2017.
We wanted to share this infographic with some key findings.
Topics: Information Governance, cybersecurity, Infographic, Cybersecurity Infographic, Information Security
Our partners at SentinelOne recently reported that 50 percent of organizations have been victim to cyberattacks. Eighty-five percent of those said they had been attacked three or more times.
Topics: Training, Information Governance, cybersecurity, Two Factor Authentication, Hacking, FBI Internet Crime Complaint Center, Secret Service, Cybercrime, Email Security, 2FA
Posted by Kyle Worley
February 16, 2016 5:05 PM
When it comes to information security there is no silver bullet to stop attackers from infiltrating your firm. The “defense-in-depth” approach to information security is simple: add many layers of protection between yourself and the outside world. Hardening your computer is exactly what it sounds like, adding security measures to increase the difficulty of an attacker compromising your system. Below you will find a checklist of system hardening best practices, each of these are easy to implement and are critical in protecting your computer.
Topics: Security, Malware, Technology Consulting, Data Recovery, IT Tips, Disaster Recovery, Information Governance, Email Management, Access Control, SentinelOne
Posted by Tim Van Bourg
January 12, 2016 8:00 AM
Law firms need to know where their intellectual property is at all times. They also need the ability to track who has accessed what data from where and what they did to it. Most important, they need the ability to lockdown information that should never leave the firm’s physical or digital walls.
Topics: Security, Technology Consulting, IT Tips, ECM, Information Governance, Network
Comment on this post