Similar Posts
Impact of Cybersecurity on Mergers and Acquisitions
We often get asked about how a seller’s cybersecurity practices impact business valuation and related to that, how a lack of cybersecurity due diligence on the part of the buyer impacts overall risk. Here are two very public examples of that; one favorable to the buyer, the other favorable to the seller. If you are…
Old Attacks Never Die – USB Malware Spreader
In this case, it wasn’t the well known “candy drop” attack but rather an accidental USB attack. Still infected an entire hospital. This one is attributed to China. Learn more below.
Creating a PIEE/SPRS Account and Entering Your Score
Here are two videos; the first one shows you how to create an SPRS account; the second shows how to enter a new score. NOTE: You will see that I got an error on the PIEE administrator role in the first setup. That may be due to the fact that I already have an account…
Why Dark Web Monitoring Is Critical
The dark web is where most of the content is illegal and most of the traffic is about how to do illegal deeds. It is also where, for example, credentials to the Los Angeles School District network were available for sale prior to the ransomware attack on the district’s network earlier this month. Likely the…
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
What is the Shared Responsibility Model and How Does it Affect Me?
The shared responsibility model is the way that cloud service providers reduce their risk if something bad happens. For the most part, unless you have an unusual contract with your cloud service provider, if something bad happens, it is your problem. If you have not planned for this, you could be in deep yogurt. Learn…