Categories
Application Security IT Security Outsourced IT

Cybersecurity for Operational Technology

What is Cybersecurity for Operational Technology? Operational technology (OT) encompasses a broad range of programmable systems or devices that interact with physical environment (or manage devices that interact with the physical environment.)1 These systems and devices detect or cause a direct change through the monitoring and/or control of devices, processes, and events. Examples of OT […]

Categories
Application Security IT Security Outsourced IT

Shared Responsibility Model in Cloud Security

What is the Shared Responsibility Model in Cloud Security? Cloud service providers (CSPs) adhere to a “shared responsibility model” that delineates what responsibilities belong to cloud customers and CSPs. Defining the line between the responsibilities of cloud customers and CSPs helps to reduce the risks of introducing vulnerabilities into public, hybrid, and multi-cloud environments. The […]

Categories
Application Security IT Security Outsourced IT

InfoSec

What is InfoSec? Information security, aka InfoSec, refers to the processes and tools that are designed and deployed to protect sensitive business information from unauthorized modification, disruption, destruction, and inspection1. InfoSec encompasses physical and environmental security, access control, and cybersecurity, and often includes technologies such as cloud access security brokers (CASB), deception tools, endpoint detection […]

Categories
Application Security IT Security Outsourced IT

Office Relocation Cybersecurity Risk Management

What is Office Relocation Cybersecurity Risk Management? Whether your whole organization is relocating, or you are simply transitioning to a home office, there are many cybersecurity considerations that will help to ensure that your move is smooth and secure. The following tips can help guide the transition to your new space: Data protection. Classify all […]

Categories
Application Security IT Security

Small Business Hacking Threats

What are Small Business Hacking Threats? With the increase in remote work and the use of cloud storage, many small businesses are facing new and increased threats to their cybersecurity due their increased attack surface. An attack surface is the number of possible points, or attack vectors, where unauthorized users can access, manipulate, and/or extract […]

Categories
Application Security IT Security

Employee Monitoring Ethics

What are Employee Monitoring Ethics? The demand for employee monitoring software has increased over the last few years, as the pandemic caused many employees to transition to remote work and supervisors found themselves challenged to find new methods to supervise them. It has been common knowledge that activity at work will be monitored but being […]

Categories
Application Security IT Security

Cybersecurity Tips for Business Travelers

What are Cybersecurity Tips for Business Travelers? Whether your business travel plans are domestic or international, it is important to consider cybersecurity threats, as business travelers are likely to be in possession of multiple devices including tablets, laptops, and smartphones that contain sensitive data. The following tips are designed to protect sensitive personal and professional […]

Categories
Application Security IT Security

iPhone Calendar Viruses

What are iPhone Calendar Viruses? Over the last few years, cyberattackers have been increasingly targeting the iPhone calendar app in an attack known as “calendar spam.” In these attacks, iPhone users have reported that their calendars have been filling up with strange appointments, reminders, and other junk events that are often pornographic or contain warnings […]

Categories
Application Security IT Security

Multi-Persona Impersonation

What is Multi-Persona Impersonation? Multi-Personal Impersonation (MPI) is a new email phishing technique that can make detection even more difficult for email users. The MPI technique uses the psychology principle of “social proof” to increase the perception of authenticity of emails, increasing the likelihood that unsuspecting recipients will click on them.1 The principle of social […]

Categories
Application Security IT Security Outsourced IT

Email Encryption

What is Email Encryption? Email encryption is an authentication process that disguises the contents of messages so that only the intended recipients can access and read them. This is done by scrambling plain text so that the email can only be read by an authorized recipient with a private key. With Public Key Infrastructure (PKI), […]