Sage Advice - Cybersecurity Blog

Cybersecurity Metrics Your Board of Directors Should Care About & Why

Businesses today are going through an incredible digital transformation – moving to the cloud, embracing the Internet of Things (IoT), implementing automation, etc. – all at a lightning fast pace. This is opening them up to new and expanding cybersecurity threats that are difficult to manage.

Read More

Topics: Cybersecurity Culture, Risk Management

Cybersecurity Questions Board of Directors Should Be Asking

One of the key findings from PwC’s 2018 Global State of Information Security Survey is that when it comes to managing cybersecurity risk and building cyber resilience, senior leaders driving the business must take ownership. In fact, they found that Board confidence in security measures is actually tied to their participation in the company’s overall security strategy.

Read More

Topics: Cybersecurity Culture, Risk Management

How to Make Your Board of Directors Cyber Smart

As cyber threats continue to escalate, Boards of Directors are becoming increasingly interested in cybersecurity and risk management. This is no surprise, as the Board is ultimately held liable and responsible should a breach occur. And it’s important because leadership sets the tone for the rest of the organization. They must lead by example when it comes to cybersecurity, and actively participate in, and be supportive of, the mission to be secure. As such, cybersecurity has made its way onto the agenda of many Board meetings.

Read More

Topics: Cybersecurity Culture, Risk Management

Cybersecurity Roles and Responsibilities for the Board of Directors

Cyber threats are daunting. Not only are they complex and constantly evolving, they have the potential to impart significant financial and reputational damage to an organization. Plus, there’s no way to be 100% protected. That’s why cybersecurity is no longer just the responsibility of IT departments. Boards of Directors are ultimately liable and responsible for the survival of their organizations, and in today’s interconnected world, cyber resilience is big part of that responsibility. That means that Boards must take an active role in cybersecurity.

Read More

Topics: Cybersecurity Culture, Risk Management

What We Can Learn from the Top 8 Cybersecurity Fails of 2017

If we look back at some of the recent cybersecurity headlines, it’s clear to see that it’s been a year full of ransomware and cover-ups. We saw a significant uptick in the maturity and sophistication of attacks. Not only was more data stolen than ever before, the biggest hacks we’ve ever experienced occurred. It short, it was a banner year for hackers.  

Read More

Topics: Cyber Defense

Why Your Business Should Consider Managed Threat Detection

When it comes to cybersecurity, organizations are moving away from prevention-only approaches, and focusing more on detection and response. The shift to this approach "spans people, process and technology elements and will drive a majority of security market growth over the next five years.,” says Gartner’s principal research analyst, Sid Deshpande.  Of course it doesn’t mean that prevention techniques aren’t still an important part of your security program. But it “sends a clear message that prevention is futile unless it is tied into a detection and response capability.”

Read More

Topics: Threat Detection Tips, Threat Hunting

Threat Hunting: Common Attack Vectors and Delivery Channels

It’s generally accepted that the best defense is a good offense. In cybersecurity terms that means taking a more proactive approach to catching our cyber adversaries. Cyber threat hunting is an effective method for searching your network for malware and other threats that have evaded traditional security defenses. To be a successful threat hunter it’s important to understand the adversaries we’re facing, as well as the tricks and techniques they use. Let's take a look at a few.

Read More

Topics: Threat Detection Tips, Threat Hunting

Threat Hunting: Six Cyber Adversaries to Pursue

When threat hunting, you must first understand the adversaries you’re facing. While their techniques may be very similar, what motivates them can be very different. Understanding these motivations can provide you with a better understanding of where and when a cyber attacker may strike or when an unwitting accomplice takes measures that present undue risk to the organization.

Read More

Topics: Cyber Defense, Threat Hunting

Four Cybersecurity Myths Organizations Need to Bust

In today’s threat environment, we can count on the fact that there will be more spectacular breaches to come. The bad guys will always get in. It’s time to acknowledge that reality and take action.

In our experience, many organizations who are just getting started on their path to cyber resiliency have a few misconceptions when it comes to cybersecurity. These myths must be busted in order for organizations to defend themselves against the risks they face. Here are four of the most common myths that must be busted.

Read More

Topics: Security Policy, Cybersecurity Culture

Threat Hunting: Anatomy of a Cyber Attack

Hackers are people, so when threat hunting, it’s important to think like they do. You need to understand the tricks and techniques that are commonly used. This intellectual capital can provide mature threat hunters with an advantage as they share common skills and traits with their unethical counterparts. 

Read More

Topics: Threat Detection Tips, Threat Hunting