Sage Advice - Cybersecurity Blog

4 Steps to a Privacy Initiative Roadmap

Digital privacy is an evolving, hot topic in the world right now. With the rise of ecommerce, digital marketing, online offers, and smart devices, it’s extremely difficult not to have your personal information – whether that be transactional information or information that defines you – out there. But what if we thought about it from the standpoint of your business? How can you make sure your organization is protecting individuals’ data and using best privacy practices? Let’s delve in to how you can create a privacy initiative roadmap for your organization.

Read More

Topics: Privacy

Privacy Regulations: What You Should Know

As consumers, our information is everywhere. With nearly everything connected to the web, it’s nearly impossible not to have your personal data out there. Because of this, privacy is a hot topic, now, more than ever. This means that entities must take precautions to protect the valuable data they have on you so that your personal data is not stolen.

Read More

Topics: Privacy

Why Does Privacy Matter?

Digital privacy is an evolving topic that is increasingly part of the cybersecurity discussion. Private information is transmitted in nearly every interaction of every day, from digital habits such as app and website usage, to purchases, to driving habits. Looking back at recent data breaches, it’s interesting that the largest breaches didn’t involve stolen credit card or social security numbers. Instead personal information is being stolen in large quantities. This private information is not only extremely valuable to us as individuals, but it’s becoming increasingly attractive for cybercriminals as well.

Read More

Topics: Privacy

Cyber as a Domain: A Government Pledge

State-sponsored cyberattacks from national agencies or affiliates are a rising concern. Even though U.S. cyber-responses have become more prevalent, foreign hackers still pose a powerful threat, given the ever-changing threat landscape and heightened abilities of these adversaries.

Read More

Topics: Sage News, Threat Advisories, Threat Intelligence, Cybersecurity Culture, Cybersecurity Awareness

Five Steps to a Cybersecurity Culture

In the current cyber threat environment, organizations must be vigilant. Vigilance begins with preparation. Being prepared starts with being aware. To be successful, you need to develop cybersecurity awareness throughout your entire organization, which leads to organizational practices that support the secure execution of your business strategy. You need to create a culture of cybersecurity.

Read More

How to Protect Your Organization from a Ransomware Attack

Ransomware attacks can have devastating consequences for organizations. Downtime is often more detrimental than ransom costs. Recovery is expensive, and there is a significant cost in system disruption, emergency response, and reputation damage.

Read More

Topics: Ransomware, Cybersecurity Awareness

Anatomy of a Ransomware Attack and How to Detect the Threat

Ransomware continues to be a significant threat to organizations of all sizes. Victims of an attack are denied access to their data. Many times, files are encrypted, and a ransom is demanded to restore access. If hit, the best-case scenario is that you have clean backups to restore your systems and can avoid paying the ransom.  However, downtime is often more detrimental than ransom costs. Recovery is expensive, and there is a significant cost in system downtime, emergency response, and reputation damage.

Read More

Topics: Ransomware, Threat Hunting

5 Lessons Learned at our Ransomware Cybersecurity Summit

Local governments and school districts are falling victim to ransomware attacks with alarming frequency and devastating consequences. At any organization, having tools in place to improve cyber resilience is a necessity, especially as hackers get more sophisticated every day.

Read More

Topics: Cybersecurity Culture, Ransomware, Cybersecurity Awareness

The Concentration Risk of Cloud Services

The epic Target breach raised our awareness that third-party service providers are a significant cybersecurity risk. It showed us how an employee at an HVAC vendor could click a phishing link and result in 40 million credit / debit card numbers and 70 million customer and employee records being compromised.

Read More

Topics: Vendor Management, Cloud Security

How to Assess the Security of Your Cloud Service Providers

Like everything in technology today, the activities of cybercriminals are constantly evolving. Your organization must keep pace to protect your data and your reputation. The place most clients are with this query is, “What are our peers doing?”

Read More

Topics: Financial Sector, Cloud Security