Making a bad situation worse: how Equifax mishandled the breach

By Michelle Drolet . 28 Sep 2017

Companies must respond to data breaches properly to limit the damage. Unfortunately, Equifax did not. There have been some very high-profile data breaches in the last few years, but the latest disaster to hit the headlines concerns one of the largest credit bureaus in the United States. It’s estimated that the Equifax data breach exposed 143 million consumers, with … Continue reading Making a bad situation worse: how Equifax mishandled the breach

Achieving long-term resilience with NIST’s Cybersecurity Framework

By Michelle Drolet . 19 Sep 2017

The need for continuous monitoring, effective metrics and skilled workers. The laudable aim of the National Institute of Standards and Technology (NIST) is to build a common language through a set of best practices and security principles that any organization can apply to combat cybercrime. We’ve looked at what NIST’s Cybersecurity Framework can do for you. … Continue reading Achieving long-term resilience with NIST’s Cybersecurity Framework

Build it right with NIST’s Cybersecurity Framework

By Michelle Drolet . 13 Sep 2017

Diving into NIST Special Publication 800-53 for practical advice. We’ve already laid out a broad overview of what NIST’s cybersecurity framework can do for you, so today we’re going to drill into Special Publication 800-53. Published by the National Institute of Standards and Technology, and based on important research from the Information Technology Laboratory, this publication offers … Continue reading Build it right with NIST’s Cybersecurity Framework

What NIST’s Cybersecurity Framework is and why it matters

By Michelle Drolet . 17 Aug 2017

Practical advice to help you build a solid InfoSec plan The risk of your business falling victim to cybercrime has never been higher. Despite a seemingly endless parade of high profile data breaches, ransomware attacks, and phishing scams, many organizations still lack the necessary defenses to identify, prevent, or recover from an attack. The trouble … Continue reading What NIST’s Cybersecurity Framework is and why it matters

Tips to Protect Your Business From Ransomware

By Michelle Drolet . 16 Aug 2017

Over the last few years we’ve observed the steady rise of ransomware with some trepidation. It is fast becoming a multi-million dollar business, and it’s getting surprisingly sophisticated. The ransomware industry is continually innovating, offering cybercriminals new technology, various business models, and all the support they need to conduct successful attacks on unsuspecting individuals and … Continue reading Tips to Protect Your Business From Ransomware

10 things I know about… Securing mobile devices

By Michelle Drolet . 27 Jun 2017

10) Always lock your screen. Unlocked phones are always going to dangerously accessible. The first line of defense is a PIN, password, pattern or a biometric measure like your fingerprint. 9) Only install trusted apps. Apps should only ever be installed from official app stores, or your enterprise app store, to reduce the risk of … Continue reading 10 things I know about… Securing mobile devices

Michelle Drolet interviewed on the WannaCry Ransomware Attack

By Michelle Drolet . 22 May 2017

After the recent wave of WannaCry ransomware attacks, managed service providers said the key takeaway they are bringing to customers going forward is the importance of proactive security.   “Our whole stance is around proactive security. When you have proactive [security], WannaCry is not going to have an impact,” said Michelle Drolet, CEO of Framingham, … Continue reading Michelle Drolet interviewed on the WannaCry Ransomware Attack

10 things I know about… Public Wi-Fi

By Michelle Drolet . 2 May 2017

10. Freely hackable Free public Wi-Fi connections are treated like a public utility, but they can be making you vulnerable to hackers. 9. Sign me up By default, most mobile phones/devices are set to ask your permission to join a network. Once you obtain credentials, the known network will join your phone automatically. 8. Sniffing … Continue reading 10 things I know about… Public Wi-Fi

Protect your unstructured data with user behavior analytics

By Michelle Drolet . 4 Apr 2017

User behavior analytics sniffs out anomalies in users’ actions and alerts IT security teams of suspicious behavior The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its … Continue reading Protect your unstructured data with user behavior analytics

Great article: Fraud Speak — Learn the Lingo to Beat Scammers

By Michelle Drolet . 24 Mar 2017

In order to stay ahead of threats, you need to know what to watch out for. This great article: Fraud Speak — Learn the Lingo to Beat Scammers >   breaks down and defines hacker lingo. Stay informed, stay ahead, stay safe.  

Tags