Vendor Management: 7 Tips for Security During Remote Work

Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards while using their services when they have access to the company network. But that was when most people were working from their company’s physical place of business and […]

The post Vendor Management: 7 Tips for Security During Remote Work appeared first on Security Intelligence.

Continue reading Vendor Management: 7 Tips for Security During Remote Work

Should Organizations Be Operating Outside of Their Risk Appetite?

Organizations should know where to draw what may be a new line in their risk appetite, so they can weigh the amount of risk they are willing to take in the pursuit of their business objectives.

The post Should Organizations Be Operating Outside of Their Risk Appetite? appeared first on Security Intelligence.

Continue reading Should Organizations Be Operating Outside of Their Risk Appetite?

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Great healthcare cybersecurity goes beyond IT best practices. Assessing the human element is essential to developing and deploying a holistic approach to security.

The post Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity appeared first on Security Intelligence.

Continue reading Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Create Cyber Incident Response Policies for Any Type of Disaster

If your organization is proactive, you should have a cyber incident policy in place for that worst-case scenario of your files being compromised by a bad actor.

The post Create Cyber Incident Response Policies for Any Type of Disaster appeared first on Security Intelligence.

Continue reading Create Cyber Incident Response Policies for Any Type of Disaster

10 Myths and Misconceptions About Industrial Espionage

Industrial espionage is real, it’s common, and it can be very costly for your organization. Don’t fall for the myths around this serious issue. Start preparing for the threat today.

The post 10 Myths and Misconceptions About Industrial Espionage appeared first on Security Intelligence.

Continue reading 10 Myths and Misconceptions About Industrial Espionage

How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats?

Today, the cyberthreats that pose the greatest risk to the airline industry include financially motivated attackers seeking to compromise customer data.

The post How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats? appeared first on Security Intelligence.

Continue reading How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats?

5 Must-Haves for Your Next Managed Security Services Provider (MSSP)

With a modern managed security services provider (MSSP), organizations can gain the specialized skills needed to cost-effectively protect against the increasing range, volume and severity of threats.

The post 5 Must-Haves for Your Next Managed Security Services Provider (MSSP) appeared first on Security Intelligence.

Continue reading 5 Must-Haves for Your Next Managed Security Services Provider (MSSP)

Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist

Failing to include a cybersecurity assessment on your merger and acquisition (M&A) due diligence checklist means risking a data breach — and potentially shaving millions off the price of the deal.

The post Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist appeared first on Security Intelligence.

Continue reading Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

M&A Security Considerations and the Importance of Due Diligence

Reading Time: 4 minutes Organizations that fail to assess the risk posture of an acquisition target in accordance with M&A security best practices could expose themselves to data breaches, IoT security threats and more.

The post M&A Security Considerations and the Importance of Due Diligence appeared first on Security Intelligence.

Continue reading M&A Security Considerations and the Importance of Due Diligence