Basics of Risk Management: IT Security 101

Basics of Risk Management: IT Security 101

Definition of Risk Management I’m sure you’ve heard the concept of “managing risk.” From financial risks to new product launches, there’s no doubt it’s come up when talking about your business. When we talk about Cyber Security though, we define Risk Management as the...
What is Penetration Testing?

What is Penetration Testing?

What is Penetration Testing? In Cyber Security, we often talk about hackers and how they can wreak havoc on your business systems & finances. For a moment though, let’s talk about something called “ethical hacking”. Penetration Testing is exactly that, hiring a...
Disaster Recovery Plans: Why Businesses Need A DRP

Disaster Recovery Plans: Why Businesses Need A DRP

What is a Disaster Recovery Plan (DRP)? Even though DRP is an umbrella term for multiple types of disasters, let’s focus on Cyber attacks and Data Breach incidents, shall we?  These plans include but are not limited to Virtual, Cloud, Network, Data Center protection,...
Data Breaches: What can we learn in 2022?

Data Breaches: What can we learn in 2022?

In 2022 alone, companies such as Microsoft, CashApp, GoodWill, GiveSendGo, and even Crypto.com suffered earth-shaking Data Breaches.  Let’s shallow dive into some basics and a few dirty details of each before we cliff jump into the nitty gritty.   Which is?  Learning...
Top 5 Cyber Attacks of 2021

Top 5 Cyber Attacks of 2021

What is a Cyber Attack? A cyber attack is when an unauthorized party develops a malicious piece of code called malware that enables them to gain access to your information systems. In doing this, attackers can manipulate, steal or encrypt data, impersonate or even...