Touchdown! Measuring External Cyber Posture and the NFL Hack

This week, sports fans reacted with disbelief when it was discovered that 15 NFL teams’ social media accounts were hacked. Those targeted included the two teams that will play in the Super Bowl LIV Championship match on February 2, the Kansa… Continue reading Touchdown! Measuring External Cyber Posture and the NFL Hack

Why Third-Party Security is Critically Important in 2020

The new year has only just begun, and many CISOs and compliance professionals are making third-party risk management a priority. Similar to how those who never received flu shots may suddenly decide to vaccinate during a particularly bad flu seaso… Continue reading Why Third-Party Security is Critically Important in 2020

The 5 Most Essential Third-Party Cyber Risk Assessment Tools

Cybersecurity and compliance professionals agree that third-party cyber risk management is vital to organizations. Without having the right security policies and procedures in place, your organization could be vulnerable to a third-party cyberatta… Continue reading The 5 Most Essential Third-Party Cyber Risk Assessment Tools

5 Key Ways to Effectively Communicate with Your Vendors

Your organization needs vendors to outsource tasks, and your vendors need you to grow their business. But what should be a simple business transaction between two parties can be hindered by cybersecurity requirements. 
The post 5 Key Ways to … Continue reading 5 Key Ways to Effectively Communicate with Your Vendors

Tips for Your Vendor Security: How to Prevent Phishing Attacks

Phishing is an attempt to deceive a victim in order to gain access to confidential information and/or distribute infected files. Even with the latest technologies that prevent many phishing emails from reaching inboxes, and even with the right tra… Continue reading Tips for Your Vendor Security: How to Prevent Phishing Attacks

Top 5 Ways to Minimize the Risk of Third-Party Breaches

Third-party breaches are on the rise. According to a recent report by the Ponemon Institute, over 60% of US companies experienced a data breach caused by one of their third parties in 2018, up from 49% in 2016. 
The post Top 5 Ways to Minimiz… Continue reading Top 5 Ways to Minimize the Risk of Third-Party Breaches

Security for Subsidiaries: 4 Lessons Learned From the Toyota Breach

Last week we heard about another massive data breach, this one through automobile maker Toyota, which exposed the information of 3.1 million customers. The incident occurred when hackers targeted Toyota subsidiaries including Lexus Koishikawa Sale… Continue reading Security for Subsidiaries: 4 Lessons Learned From the Toyota Breach