Category: Policies and Training

Your security initiatives are only as effective as the policies and training designed support them. Look here for advice on crafting strong cyber and physical security policies as well as best practices for communicating these policies through proper training.

MTA Installing Security Cameras in All NYC Subway Cars

In an effort to both increase safety and bring more riders back to the nation’s largest subway system, the Metropolitan Transportation Authority (MTA) will be installing security cameras in every New York City subway train car and at over 100 subway stations, New York Gov. Kathy Hochul announced on Sept. 22. The move comes in […]

National Safety Council Offers Guidance on Preventing Workplace Violence

Workplace violence is on the rise, yet nearly half of U.S. employers report they are unprepared to prevent and respond to incidents on the job. Recognizing this critical gap in safety preparedness, the National Safety Council released a report and playbook through the nonprofit’s Work to Zero initiative: Workplace Violence: Using Technology to Reduce Risk. This new resource aims to […]

The Trickle Up and Trickle Down of Business Cybersecurity

Cybersecurity breaches are technical by definition. But they can also be measured in dollars and cents. And in the end, most business cybersecurity attacks are traceable to unwitting people within your organization. Many breaches are caused by sloppy habits and a pervasive lack of employee cybersecurity education. Ironically, consumer awareness of cyber risks is on […]

Biden Admin Launches $1 Billion State and Local Cybersecurity Grant Program

The U.S. Department of Homeland Security (DHS) announced a “first-of-its-kind” cybersecurity grant program specifically for state, local, and territorial (SLT) governments across the country. This State and Local Cybersecurity Grant Program, made possible thanks to President Biden’s Bipartisan Infrastructure Law, provides $1 billion in funding to SLT partners over four years, with $185 million available […]

While Cyber Reporting Law Will Help Combat Ransomware, Data Recovery Remains Essential 

With President Biden signing a $1.5 trillion omnibus appropriations bill into law earlier this year, the federal government is poised to spend billions of dollars to strengthen cybersecurity and information technology within its agencies. But the spending package also addresses one of the more persistent challenges to identifying and mitigating wide-ranging cyberattacks, including ransomware, in […]

Combat the Top 3 Challenges of Zero Trust with Platform-First Identity Security

“Never trust, always verify” was the founding principle of the term Zero Trust, when Forrester Research Analyst and cybersecurity veteran John Kindervag created the term. At the time, many enterprises were operating under a “trust, but verify” approach, which would be okay if threats were only outside the organization or if it only applied to […]

10 Back-to-School Cybersecurity Tips

Now that schools and colleges have started up their academic year, it’s important to stay protected electronically. Security professionals who work in educational settings should teach students and staff how to properly safeguard themselves from cybersecurity threats whether they are using institutional computer equipment or are bringing their own smart devices such as smartphones, smartwatches, […]

What It Takes to Win the War Against Fraudsters

Each day, thousands of desperate people fall victim to fraud, encountering scammers at every corner, with many scammers also desperate. These encounters often result in high losses, with lives being extremely impacted. It’s the scale and breadth of this suffering that needs to be highlighted. Fraud professionals often have too narrow of a view of […]

Working Remotely? Here’s What You Need to Know About Bossware

The pandemic created various challenges for both employers and employees. As organizations rushed to transition to remote work, employees were shifted to various types of technology to accommodate the change in work environment. Employees were required to learn a new way of connecting to corporate networks to be productive remotely, from virtual private networks to […]

Twitter’s Security Flaws Highlight Cyber Issues Endangering Americans

Peiter “Mudge” Zatko’s recent whistleblower complaint has drawn Americans’ attention to potential security concerns with Twitter. According to Zatko, the social media company has not complied with its Federal Trade Commission agreement to protect users’ privacy. Even after people cancel their accounts, for instance, it’s unclear if the company deletes their personal data. Perhaps the […]