Insights

healthcare

A Healthcare Security Checkup

As the healthcare sector continues to fight on the frontlines against the COVID-19 global pandemic, it faces the added challenge of warding off a steady rise in cyberattacks. Attacks against the American healthcare system increased by 55% in 2020, with more than a third of healthcare organizations globally suffering ransomware

Read More »
cybersecurity initiatives

The White House’s New Cybersecurity Initiatives

Two weeks ago, President Biden held a cybersecurity summit at the White House, where a raft of public and private initiatives were announced to improve the nation’s cybersecurity posture. CEOs of major technology companies, including Alphabet, Amazon, Apple and Microsoft, as well as banks, insurers and educational institutes were in

Read More »
CISA bad practices

CISA’s Bad Practices

The Cybersecurity and Infrastructure Security Agency (CISA) recently adopted a new tactic to improve the nation’s cyber defenses: rather than focus on what organizations should be doing to protect themselves, CISA’s new catalog of bad practices puts the spotlight on the worst security practices. The list currently contains three entries:

Read More »
c-suite

What the C-Suite Needs to Understand About Cybersecurity

Cybersecurity is the responsibility of everyone in an organization, but some positions have more responsibility than others. The C-suite has a unique role in establishing and maintaining the organization’s security culture. Employees align their behavior to signals from leadership, for instance, when determining if security protocols should be sidestepped to

Read More »
zero trust architecture

Is Zero Trust the Future?

In response to the recent onslaught of headline-grabbing security breaches, such as the attacks on SolarWinds and the Colonial Pipeline, the U.S. federal government is taking decisive steps toward a zero trust future. In May, the Biden Administration issued a cybersecurity executive order that, among other provisions, mandates that all

Read More »
privacy program

Is Your Privacy Program Enough?

According to the UN Conference on Trade and Development (UNCTAD), more than three-quarters of countries worldwide have or are working towards data protection and privacy legislation. Navigating these numerous and sometimes contradictory regulations present considerable challenges to organizations. In addition, enforcement actions for non-compliance come with severe monetary penalties and

Read More »
cyber hygiene

Are You Practicing Proper Cyber Hygiene?

Practicing good cyber hygiene means proactively maintaining the health and security of an information system by establishing routine processes to defend against cyber threats and attacks. It makes data less vulnerable to the risks present in the threat landscape and even helps to prevent information and data from being misplaced. Proper

Read More »
Cybersecurity Maturity Model Certification

Achieving Cybersecurity Maturity Model Certification

By the year 2026, organizations wishing to do business with the Department of Defense (DoD) must have Cybersecurity Maturity Model Certification (CMMC). The new CMMC framework applies to all prime contractors and subcontractors in the Defense Industrial Base (DIB), which consists of more than 300,000 organizations. What is CMMC? CMMC

Read More »
cybersecurity talent gap

Bridging the Cybersecurity Talent Gap

The global cybersecurity labor shortage is more than four million people, and there is a dire need for millions of cybersecurity professionals to fill available jobs, according to the (ISC)²’s 2020 Cybersecurity Workforce Study. Data in the report depicts an industry under intense pressure, forced to do more with fewer resources

Read More »
working from home

How Working from Home Changed Cybersecurity

During the pandemic, the shift to a remote workforce changed cybersecurity by decentralizing the office-based work environment. And it also hastened the adoption of preexisting expert guidance. The following is a deeper dive into how the WFH environment reshaped the way organizations approach cybersecurity. Addressing the Security Risks People were

Read More »

Learn more about our diverse set of technology services for the federal and commercial markets.