Resource Category: Insights

Michelle Drolet

An organization’s initial reaction to a cybersecurity incident is critical when a ransomware attack or a data breach occurs. These actions ultimately determine whether the incident escalates into a more damaging issue or is contained swiftly. A quick and timely response can help mitigate the impact and minimize financial losses, protect sensitive data and safeguard

Michelle Drolet

The Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity standard introduced in 2020 to ensure that defense contractors and subcontractors protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). While the scope of the CMMC was initially limited to organizations within the Defense Industrial Base, it was recently expanded to include universities and colleges since many of

Michelle Drolet

The Payment Card Industry Data Security Standard’s 4.0 requirements are designed to protect card information from theft or fraud. Here are some important controls that must be in place before April 2025. The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements introduced by the Payment Card Industry Security Standards

Michelle Drolet

Approximately 1 in 3 SMBs were hit by a cyberattack last year—some costing upward of $7 million. The need to prioritize cybersecurity has never been greater. Let’s explore nine cybersecurity elements that organizations must prioritize for 2025. 1. Put Someone In Charge Just like you have an expert in charge of looking after your company’s finances, it’s

Michelle Drolet

The US Department of Health and Human Services (HHS), through its Office of Civil Rights (OCR), is proposing an update to the “Security Rule” of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The proposed Security Rule requires entities like healthcare providers, business associates, and health plans to improve cybersecurity practices. This is the first update the Security Rule has received since 2013, and it’s mostly driven by escalating cyberattacks resulting

Janelle Drolet

If you’re in charge of payment card data at your company, you’ve probably come across the term PCI DSS. No, it’s not some secret code; it stands for Payment Card Industry Data Security Standard. Basically, it’s a set of rules designed to keep your customers’ card info safe from cyber crooks. Here to tackle today’s

Michelle Drolet

The Gramm-Leach-Bliley Act (GLBA) is a U.S. federal regulation that seeks to protect consumer financial privacy. GLBA mandates that financial institutions be transparent with their customers about how their data is shared and how sensitive data is kept safe. The GLBA regulation is divided into three sections: 1. The Financial Privacy Rule: Describes how consumer financial information must be collected

Greg Neville

Organizations routinely encounter a myriad of cyberthreats that jeopardize their data, operations and reputation. To address these constantly evolving threats, organizations need consistent methodologies and tools to proactively identify security gaps and weaknesses.A well-designed risk assessment will empower your organization to prioritize security initiatives that have the most value and a gap analysis can help

Michelle Drolet

Just in time for the 2024 U.S. elections, cyberattacks and malicious activities are ramping up. For numerous reasons, elections are the perfect time for opportunistic cybercriminals to target businesses: • High visibility: Elections provide an ideal platform for nation-states and hacktivists looking for ways to undermine democracies, destabilize elections, damage reputations and steal campaign data. Since elections

Janelle Drolet

8) With a cyberattack or data breach, containment is all important, otherwise business continuity is not possible. Priority one is protecting your crown jewels: your critical data and assets. By identifying these upfront, organizations ensure the most valuable assets are safeguarded. 7) Everyone in your organization should be aware of the many cyber risks, what