Sage Advice - Cybersecurity Blog

Medical Identity Theft: Tips for Detection, Correction, and Protection

If you’ve been the victim of identity theft, you’re not alone. In the past five years, we’ve seen healthcare data breaches grow in both size and frequency, with the largest breaches impacting as many as 80 million people. One in four US consumers had their healthcare data stolen in 2017, and 50% of breaches resulted in medical identity theft. Victims paid an average of $2,500 out-of-pocket costs per incident (Accenture).

Read More

Topics: Cyber Defense, Healthcare

Managing Vendor Cybersecurity Risk: Lessons from the Mega Breach that Started it All

Even more than five years later, the Target breach is still one of the top 10 data breaches of the 21st century. It was also a watershed moment for cybersecurity. Not only did it shine a spotlight on payment card security, it also brought to light the idea that third-party vendors are a potential cybersecurity risk that organizations need to consider.

Read More

Topics: Vendor Management, Risk Management

Why Managing Third-Party Cybersecurity Risk Matters

It has become the norm for businesses today to rely on a multitude of third-party service providers and other vendors to support core business functions. It’s also pretty common for these third-party entities to have access to a company’s data and its internal systems. This interconnectivity presents an inherent risk that must be managed. After all, you can outsource the function, but never the responsibility.

Read More

Topics: Vendor Management, Risk Management

Seven Steps to a Successful Vendor Risk Management Program

If you’re like most businesses, you have a variety of third-parties that you rely on to support your core business functions. And in many cases, they have the ability to connect to your network. By providing them remote access, you are effectively increasing your potential attack surface for cybercriminals to exploit. So what happens if their systems aren’t secure? They could inadvertently open up a door to your network and allow a bad guy to get in.

Read More

Topics: Vendor Management

10 Tips to Reduce Common Vulnerabilities Exploited by Cybercriminals

While it seems that today’s cybercriminals have a myriad of tricks and techniques at the ready to gain access to your network, the reality is that they are typically taking advantage of common vulnerabilities – such as unpatched software or default passwords – time and time again. That’s why establishing a regular process for finding those vulnerabilities that put you at risk is a critical part of your cybersecurity program.

Read More

Topics: Technical Testing, Cybersecurity Assessment

What’s the Difference between a Penetration Test and a Vulnerability Assessment?

In the world of cybersecurity, nothing is static. The cyber threat environment is dynamic and evolving. There are new vulnerabilities discovered on a daily basis. Attacks are getting more sophisticated – they’re getting more complex and flying under the radar of traditional detection technologies.

Read More

Topics: Technical Testing, Cybersecurity Assessment

Types of Penetration Tests and Why They are Important

While everyone may be tired of hearing, it’s not if you’ll be breached, but when, it’s the reality of our current environment. Breaches are exploding in scale and scope, and with the availability of malware-as-a-service, it’s no longer just individual lone hackers trying to get in. It’s a thriving business. One that’s incredibly organized and highly profitable.

As such, part of your cybersecurity defense strategy should include assessing the strength of your defenses against hackers. How? Using penetration testing, where a trained “white-hat” hacker tries to exploit your network much like the bad guys do.

Read More

Topics: Technical Testing, Cybersecurity Assessment

Sage Data Security Joins Tyler Technologies

Tyler Technologies, Inc. (NYSE: TYL) today announced it has acquired Sage Data Security, LLC, leading experts in cybersecurity. Sage offers a suite of services that supports an entire cybersecurity lifecycle, including program development, education and training, threat detection, technology testing, advisory services, and digital forensics.

Read More

Topics: Sage News

Cybersecurity Metrics Your Board of Directors Should Care About & Why

Businesses today are going through an incredible digital transformation – moving to the cloud, embracing the Internet of Things (IoT), implementing automation, etc. – all at a lightning fast pace. This is opening them up to new and expanding cybersecurity threats that are difficult to manage.

Read More

Topics: Cybersecurity Culture, Risk Management

Cybersecurity Questions Board of Directors Should Be Asking

One of the key findings from PwC’s 2018 Global State of Information Security Survey is that when it comes to managing cybersecurity risk and building cyber resilience, senior leaders driving the business must take ownership. In fact, they found that Board confidence in security measures is actually tied to their participation in the company’s overall security strategy.

Read More

Topics: Cybersecurity Culture, Risk Management