information-security-news-roundup-august-18

Information Security News Roundup: August 2018

, ,
With the end of the year rapidly approaching, the information security industry gets busier than ever. Its news is no different. Check out the stories that made a splash in August in this month's edition of our Information security news roundup.
Taking-Data-Security-Seriously-as-a-Small-Business

Taking Data Security Seriously as a Small Business

, , , ,
It's not always easy for small businesses to take data security seriously, but it's important for the long-term success of the company.
small-schools-protecting-student-data

Small Schools Protect Themselves by Protecting Student Data

, , , , ,
Small schools can protect themselves by protecting their student data. Here's how and why trustees should take infosec seriously in their decision-making.
ransomware-statistics

Your Business is in Danger of Becoming Another in a Long Line of Ransomware Statistics

,
Your business could very well be at risk of falling into a long list of ransomware statistics. By implementing explicit policies and procedures and following them clearly, you can help your business avoid falling victim to a ransomware attack and greatly reduce your risk of becoming the next name on the long list of ransomware statistics.
FRSecure-anniversary-vendor-risk-management-blog

FRSecure® Celebrates 10th Anniversary by Providing Vendor Risk Management Services to 10 Nonprofits Free of Charge

, , ,
FRSecure has turns 10 on August 28th, and to celebrate, we're giving out free vendor risk management services to 10 noinprofits!
pasword generator

Are Your Employees Good Password Generators and Managers?

, ,
Remembering all your passwords is a difficult and dangerous task. While using a common base for all your passwords may help you in remembering them, it also allows hackers to easily access crucial information such as bank accounts, bills, and your work computer. This has dangerous implications in both your personal life and your organization's well-being. Find out how to better protect you and your employees by becoming a better password generator and manager.
information security news

Information Security News Roundup: July 2018

,
While we are still in the midst of enjoying summer by relaxing in the sun or by staying inside to avoid the heat, information security news stories have continued to pile up. The month of July saw a wide variety of stories breaking within the…

Business Leaders: Always Be Prepared to Answer These Four Risk Assessment Questions

, , , , ,
For business leaders to make the right decisions, they must gather answers to four crucial risk assessment questions. Here are how these four simple questions can make a huge impact on your information security program.
politics-of-cybersecurity

The Politics of Cybersecurity for State and Local Government

, ,
The politics of cybersecurity can make it challenging for governments to protect constituent data. Bipartisanship can limit our abilities to make decisions on spending money on security measures, despite its importance. This needs to change, and here's why.
Water-and-Sewage-Hackers

Hackers Target Water and Sewage Systems

,
Hackers have always targeted infrastructures such as power grids, communication, and other physical systems. Now, hackers have begun to switch their attention towards water and sewage systems. The lack of understanding around the protection of these critical infrastructures has painted them as easy targets for hackers. Find out how to better protect your city or government's critical infrastructure.

Take the Information Security Bull by the Horns

, ,
Information security is a crucial component to businesses and needs adoption from executives and board members. It's time for organizations to think of information security as part of its infrastructure like warehouses, bank vaults, or loading docks. It's time to take the bull by the horns and start taking InfoSec seriously from the top down.
build-assessment

How to Rebuild and Reassess after a Data Breach or Information Attack

, ,
It's no secret that data breaches happen daily. It's not a matter of if, but when. This article provides a clear and concise plan of recovery to combat a data breach to your company. By stopping the attack as soon as possible, getting back out in front, and repairing the damage, a data breach does not have to be the end of the world for your business.