
As Mother’s Day approaches, we take time to reflect on all of the things mothers, and all caregivers, do to ensure the safety and security of their children. From the…
As Mother’s Day approaches, we take time to reflect on all of the things mothers, and all caregivers, do to ensure the safety and security of their children. From the…
This week is Data Privacy Week, an annual campaign hosted by the National Cybersecurity Alliance. The theme of this year’s Data Privacy Week is “respect privacy,” with the goal to…
By: Brianna Plush, senior consultant, Cyber Risk Advisory Cyberattacks are on the rise, and one of the most vulnerable industries is healthcare. Healthcare organizations amass enormous amounts of personally identifiable information…
Sometimes cybersecurity can feel a lot like a game of chess. Both center around your most valuable asset—in chess it’s the king, in cybersecurity it’s the data. And just when…
By: Julie Mungai, Cyber Risk Advisory manager Browsers are the gateway to the internet. All the data that we want comes through them and all the data we provide goes…
Vulnerability scans and penetration tests—they sound similar, right? Some use them interchangeably, but the truth is these terms are quite different when it comes to how they are carried out,…
In a recent survey by Cisco, 84% of respondents indicated they care about data privacy—their own data, the data of others, and the desire for more control over how that…