Articles
Plan Now or Pay Later. The Five C’s of Cyber Incident Response
Plan Now or Pay Later. The Five C’s of Cyber Incident Response I can’t count how many times I’ve been called in after a cyber incident occurs and heard the same thing: “Our systems are military-grade.” "I was told this could never happen to us.” “We didn’t [...]
Theoretical vs. Actionable IRPs: Are You Really Prepared?
Theoretical vs. Actionable IRPs: Are You Really Prepared? When it comes to cybersecurity, preparation is everything. The ability to recover quickly from a cyber incident -- or not -- often hinges on how well-prepared your organization truly is. Unfortunately, many companies misunderstand what "being prepared" really means [...]
Transparent Pricing in Cyber Incident Response is More Critical Than Ever
Transparent Pricing in Cyber Incident Response is More Critical Than Ever In today’s ever-changing cyber landscape, one of the most overlooked factors driving up the cost of incident response isn't just the sophistication of the attacks -- it's the pricing models being offered by the firms hired [...]
Is someone lurking in the background waiting to impersonate you?
Is someone lurking in the background waiting to impersonate you? Are you confident someone isn’t lurking in the background on your computer right now, gathering information and preparing to impersonate you? The era of confidently sending e-mails securely or answering the phone and knowing the caller on [...]
When Ransomware Hits: Between a Rock and a Hard Place
When Ransomware Hits: Between a Rock and a Hard Place The harsh reality of being a victim of ransomware, either directly or indirectly, is an experience far too many of us have endured. The recent high-profile ransomware attack on CDK Global, the company that provides back-office systems [...]
Left of Boom – The Importance of Planning for a Cyber Incident
Left of Boom - The Importance of Planning for a Cyber Incident Welcome to the digital age, where cyber incidents lurk around every virtual corner, posing significant threats to organizations worldwide. Whether it's a data breach, ransomware attack, or any other cybercrime, the fallout can be brutal, [...]





