Posts filed under: #cybersecurity (3)

K-12 Schools and the Increase in Cyber Attacks

All businesses have seen an increase in the number of cyber incidents and attacks, but K–12 has seen an exceptionally sharp increase. Further... Read More

What is your Cyber Risk?

Whether you like it or not, if you work in information security, you are in the risk management industry. Risk assessments are nothing new. The... Read More

Managed Detection and Response is a Challenge for SMBs

Small and medium sized businesses are struggling to understand and implement managed detection and response (MDR). Lack of security knowledge within... Read More

Patch Management is Essential for SMBs

Consider yourself on a bicycle when a nasty bump unexpectedly comes and bursts your tire. Your day might be ruined, but if you have a repair kit and... Read More

Effective Cybersecurity Awareness Training

Likely during work hours, you have gone through the cybersecurity awareness training modules provided by your employer. You might have hoped to pass... Read More

CISA Creates the Election Security Risk Profile Tool

The Joint Cyber Defense Collaborative (JCDC) and CISA collaborated to create the "Protecting U.S. Elections: A CISA Cybersecurity Toolkit," which... Read More

It May Be Time To Update Your Passwords

The first Thursday of every May has come to be known recently as World Password Day, a day in which both organizations and individuals are encouraged... Read More

New PA Bill to Allow National Guard to Counter Cyber-Attacks

The State of Pennsylvania unanimously passed House Bill 2412 on 4/27/2022, to allow the use and expertise of the Pennsylvania National Guard to... Read More

With New Threats Around the Globe, Cybersecurity is a Necessity

We are privileged to be living in a time where technology and science can aid us, and make our lives much easier and more efficient. The technology... Read More

How Cyber Insurance Can Protect Your Business

Cyber insurance offers businesses protection from financial losses created by cyber-attacks, including system hacking, data breaches, and ransomware... Read More