Information Security News Roundup: February 2019

, , , ,
February may be the shortest month of the year, but it doesn't mean there was any shortage of information security news. Check out this month's information security news roundup and see which stories made the biggest impact last month!
FISASCORE r2 Risk Assessment

10 Things to Know About FISASCORE® r2 Risk Assessment

, , , ,
Between new technologies being introduced every day, new threats emerging by the minute, and a slew of security regulations being added and changed regularly, the state of security is ever-evolving. Because of this, it's important that our security risk assessments evolve with them. For this reason, we've updated the FISASCORE® to its r2 release. Here's the 10 things you should know about a new release.

Hacks & Hops: Protecting Against Third-Party Risks

, , , ,
Despite third-party risks accounting for nearly two-thirds of all data breaches, organizations still have a hard time either getting started managing their risk or doing it the right way. Because of this, we've made our spring 2019 Hacks & Hops about this very topic.

Reversing the Talent Shortage with CISSP Training

Evan and Brad are back with their CISSP Mentor and Training class. Jim Nash interviews Evan on why people interested in information security consider taking this exam and why this course is unique to the industry.

Information Security News Roundup: January 2019

, , , ,
It's a new year, but the same thing is true: information security news is as prevalent as ever. With each year that passes, attacks get bigger and attackers get more sophisticated. Thankfully, we're also getting better at thinking of information security as a critical business issue. Here are some of the first big stories of the year, so we can stay vigilant and start 2019 on the right foot!

I'm Not Doing 2019 InfoSec Predictions

, ,
At the turn of every new year, FRSecure CEO Evan Francen comes up with InfoSec predictions. This year, Evan is breaking the mold. Find out the four reasons why Evan has decided not to do InfoSec predictions this year, and what he hopes to do in 2019 that can make an even bigger impact on the industry.

2018 InfoSec Recap: The Good, The Bad, and The Breaches

, , , , ,
2018 was another crazy year for InfoSec news. While we made some fantastic strides as an industry, it's still wrought with scary trends, huge breaches, and a lack of education. We've broken down all of these things— the good, the bad, and the breaches.

The Business Impact of a Data Breach

, , , ,
A data breach has a business impact that extends far beyond the responsibilities of your IT department. For this reason, organizations need to think about treating information security and cybersecurity like a business issue rather than an IT one. When preparing and approving an IT budget for your company for next year, think about the effects a data breach might have on your organization and why it's important to build defenses against them.

Information Security News Roundup: November 2018

, , , ,
November is an interesting time of year for information security. With the holiday season in full swing, shoppers become easy targets for data theft. November is also when the United States comes together to elect our next round of officials. The combination of those things and more keep the world of information security news a rather busy one this time of year. Check out some of the headlines from November!

Common Passwords Can Fry Your Security

, , ,
Using similar and common passwords across multiple platforms makes it easy for hackers to access your accounts. The recent Dunkin Donuts breach is an example of this. Find out what happened and what you can do to prevent similar situations from happening to you and your business.

Information Security News Roundup: October 2018

, , , ,
Halloween wasn't the only thing that was spooky about October this year, as nerve-wracking breaches were abundant this month. Find out what else happened in the world of information security news in our October Roundup.

Gone Phishing

Like fishermen, cyber-attackers use methodical and well-researched techniques to bait their targets into giving them what they want. Find out what kinds of phishing there is out there, and how you can make sure you don't end up out of water.