Read More >
Let's say you were in line at a deli and you overheard someone ask "hey, what the heck is a vulnerability assessment anyway?"
Would you feel an urge to chime in or strain to hear the reply?
Okay, if it were me, I'd probably be more concerned about which sandwich to order but the point is that answers to that question vary widely.Read More >
Some IT providers talk about ransomware but they’ve never been to war in a real case.
In this interview with Tom, he shares an example of a real situation a client was under, what happened during that stressful time and how we were able to climb out of it.Read More >
Cybersecurity breaches are a real threat. In fact, any business at some point will get breached, regardless of how good your cyber defense is, how big your company is or who you use for an IT provider. What matters is having a good defense plan, knowing what you are going to do to get your business back up and running, and especially how are you will communicate this news to your different stakeholders.Read More >
Technology is evolving at a pace that security experts are struggling to keep up with. As we mentioned in an earlier blog, IoT creates a huge risk for any business, especially those in manufacturing since the small devices are easily hacked.
Increased vulnerability has lead the cybersecurity industry to a 3 million person shortage, which is expected to worsen by 28% for 2026.Read More >
In this interview, Tom McDonald, NSI's CEO, talks about what cyber security services his company used to recommend, how these services have gotten better, and most importantly, he answers the big question: "who is primarily responsible for my security?"
The short answer is as follows: both the business owner and the IT provider carry responsibility for reducing risk, but the nature of the responsibilities are different.
Check out the interview and let us know what you think!
Read More >
Verizon's annual Data Breach Investigations Reports (DBIR) are always a must-read for security experts because the analysis is in-depth and consistently based on thousands of confirmed incidents and breaches. And not only that, the source data comes from 73 distinct sources, 66 of which are external to Verizon.
To help us digest the 78-page report, we interviewed our cyber security partner, Caleb from InfoSec. Below are the key takeaways from that interview, followed by actionable suggestions for CEOs and tips to forward to IT.Read More >