I thought this would be a good opportunity to share all the fascinating Cybersecurity topics i3 plans to make available to you to keep your North Pole Workshop safe and secure in 2022.
In our ever more connected world, the Internet of Things (IoT) is another example of how easy it is to forget "Security 101." There are now more devices than ever in the IoT category to please our every whim - devices such as home security systems, appliances, and even our children's toys communicate with us via an internet connection.
This is part of a series of blogs intended to both inform and provide potential solutions and resources to protect organizations of all sizes and industries from the perils of being a “connected” entity. In this follow-up, I explain the source and nature of the most recent and, potentially, most financially devastating of cyberattacks: Ransomware.
This is a follow-up to my previous blog title, The Importance of Cybersecurity Compliance. In that article, I explain why organizations of all types and sizes should embrace good cybersecurity practices to protect their organization’s people and information assets. I also outlined three of the many cybersecurity compliance frameworks that provide best practice guidance in achieving good cyber-health (ISO, NIST, and CMMC).