Sage Advice - Cybersecurity Blog

Easy Tools to Help You Create Cybersecurity Checklists that Work

Documenting step-by-step processes that are easy to follow, repeatable, and transferable, is a great way to create institutional knowledge. It makes your organization more cyber mature, and therefore, more resilient. Checklists are one of the methodologies that you can use to make that happen.

Read More

Topics: Cybersecurity Culture, Risk Management

Checklists to Keep Your Cybersecurity Program on Track

It’s not unusual to encounter an organization that is using practical knowledge, a.k.a. tribal knowledge, to operate. Practical knowledge is what each individual professional knows in-practice and is able to perform, but isn't really documented anywhere. It may be about how hardware is configured, how applications are designed, or in some cases, it involves information about historical decisions. The issue with tribal knowledge is that it disappears from an organization when people move on.

Read More

Topics: Cybersecurity Culture, Risk Management

How Checklists Can Improve Your Cybersecurity Program

Checklists are a great tool for keeping us on track. Surgeon Atul Gawande argues in The Checklist Manifesto: How to Get Things Right, that the simple checklist – perhaps one of the most basic organizational tools — can improve the effectiveness of teams and individuals performing complex tasks. When his team introduced a two-minute checklist to eight hospitals as part of a research study in 2008, deaths were reduced by almost half.

Read More

Topics: Risk Management, Cybersecurity Culture

Cybersecurity Metrics Your Board of Directors Should Care About & Why

Businesses today are going through an incredible digital transformation – moving to the cloud, embracing the Internet of Things (IoT), implementing automation, etc. – all at a lightning fast pace. This is opening them up to new and expanding cybersecurity threats that are difficult to manage.

Read More

Topics: Cybersecurity Culture, Risk Management

Cybersecurity Questions Board of Directors Should Be Asking

One of the key findings from PwC’s 2018 Global State of Information Security Survey is that when it comes to managing cybersecurity risk and building cyber resilience, senior leaders driving the business must take ownership. In fact, they found that Board confidence in security measures is actually tied to their participation in the company’s overall security strategy.

Read More

Topics: Cybersecurity Culture, Risk Management

How to Make Your Board of Directors Cyber Smart

As cyber threats continue to escalate, Boards of Directors are becoming increasingly interested in cybersecurity and risk management. This is no surprise, as the Board is ultimately held liable and responsible should a breach occur. And it’s important because leadership sets the tone for the rest of the organization. They must lead by example when it comes to cybersecurity, and actively participate in, and be supportive of, the mission to be secure. As such, cybersecurity has made its way onto the agenda of many Board meetings.

Read More

Topics: Cybersecurity Culture, Risk Management

Cybersecurity Roles and Responsibilities for the Board of Directors

Cyber threats are daunting. Not only are they complex and constantly evolving, they have the potential to impart significant financial and reputational damage to an organization. Plus, there’s no way to be 100% protected. That’s why cybersecurity is no longer just the responsibility of IT departments. Boards of Directors are ultimately liable and responsible for the survival of their organizations, and in today’s interconnected world, cyber resilience is big part of that responsibility. That means that Boards must take an active role in cybersecurity.

Read More

Topics: Risk Management, Cybersecurity Culture

Four Cybersecurity Myths Organizations Need to Bust

In today’s threat environment, we can count on the fact that there will be more spectacular breaches to come. The bad guys will always get in. It’s time to acknowledge that reality and take action.

In our experience, many organizations who are just getting started on their path to cyber resiliency have a few misconceptions when it comes to cybersecurity. These myths must be busted in order for organizations to defend themselves against the risks they face. Here are four of the most common myths that must be busted.

Read More

Topics: Cybersecurity Culture, Security Policy

How to Detect and Respond to Insider Threats

It’s not always easy to determine when your data has been compromised by an insider. When someone has approved access to sensitive data, and it's part of their job to use that data, how can you tell if something bad is happening?

Read More

Topics: Cybersecurity Culture, Cyber Defense

Tips to Avoid the Insider Threat

Even environments with the most mature perimeter defenses are at risk of insider threats. Whether from malicious intent, carelessness, or clicking on a phishing email, the result is the same. Your sensitive data is exposed. The good news is that there are things you can do to deter, and in some cases prevent, insiders from compromising your network.

Read More

Topics: Cyber Defense, Cybersecurity Culture