United Healthcare hack

After a debilitating ransomware attack at United Healthcare that has caused some health care providers to lose up to $1 billion a day, the US Office of Health and Human Resources is investigating the hack.  United Healthcare paid $22 million to the Russian ransomware gang that goes by AlphV and BlackCat.  To learn more read arstechnica’s article:   https://arstechnica.com/science/2024/03/paralyzing-cyberattack-spurs-federal-probe-into-unitedhealths-hipaa-compliance/  

What is a vCISO?

What is a vCISO?

A virtual chief information security officer (vCISO) is a third-party cybersecurity expert who provides organizations with strategic advice and guidance on information security matters. Typically there are one of three reasons to hire a vCISO: Your company's CISO may...

Using Multiple Emails in Outlook

Using Multiple Emails in Outlook

Did you know you can use Outlook for multiple emails? As a Virtual Chief Information Security Officer (vCISO), I work with multiple customers on a fractional basis. I end up having multiple emails. I order to make these manageable I add them to Outlook.

CISA’s Guide to Secure Small Businesses

CISA’s Guide to Secure Small Businesses

🌐💡 The staggering rise of #Cybercrime costs is a wake-up call for us all. According to Cybercrime Magazine, these costs are expected to grow by 15% per year, reaching a mind-boggling $10.5 trillion annually by 2025. 📈 #SmallBusinesses, in particular, are prime targets...

Ransomware Attack

Ransomware Attack

Ransomware attacks are not slowing down because it is a profitable business. According to Cybersecurity Ventures, ransomware damages were $20 billion in 2021 and are projected to be $42 billion by 2024.

Securing Cloud Serverless

Securing Cloud Serverless

Here are the best practices for securing cloud serverless architecture: Implement proper access controls: Use identity and access management (IAM) to set up fine-grained permissions for resources and APIs. Secure data in transit and at rest: Encrypt sensitive data and...

Building a Security Governance Program

Building a Security Governance Program

Security governance is the set of policies, procedures, and standards that an organization establishes to manage its cybersecurity risks. The compliance program ensures the confidentiality, integrity, and availability of its data and assets. To be successful, ensure...

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Two Factor Authentication Did you know that you can prevent 99% of account attacks by using multi-factor authentication (MFA)? MFA also known as two factor authentication is one of the most important security measures you can take. 99.9% of account attacks are...