https://www.i3info.com/wp-content/uploads/2021/06/ransomware_2-1280x640.jpg

This is part of a series of blogs intended to both inform and provide potential solutions and resources to protect organizations of all sizes and industries from the perils of being a “connected” entity. In this follow-up, I explain the source and nature of the most recent and, potentially, most financially devastating of cyberattacks:  Ransomware.

https://www.i3info.com/wp-content/uploads/2021/05/iStock-1131629281-1280x640.jpg

Most days, a Compliance Officer walks into their office and does one of many routine activities required by the Bank Secrecy Act or the PATRIOT Act. All of that changed on January 1, 2021 when the U.S. Senate voted to supersede former President Trump’s veto of the National Defense Authorization Act; legislators passed it into law and it includes the Anti-Money Laundering Act of 2020 (AMLA).

https://www.i3info.com/wp-content/uploads/2021/03/cyber-security-assessment-1280x640.jpg

This is a follow-up to my previous blog title, The Importance of Cybersecurity Compliance. In that article, I explain why organizations of all types and sizes should embrace good cybersecurity practices to protect their organization’s people and information assets. I also outlined three of the many cybersecurity compliance frameworks that provide best practice guidance in achieving good cyber-health (ISO, NIST, and CMMC).