Planning Ahead for Disasters

  • Posted by Emily Ambrose
  • On June 20, 2018
Hurricane season started on June 1.  Now would be a good time to think about your business continuity plans and how well they will keep your company up and running through interruptions of any kind: natural disasters, power failures, IT system crashes, supply chain problems, loss of key employee(s), and more.   The SBA recently […]
Read More
 

#CyberStrength

  • Posted by Deborah Free
  • On April 18, 2018
Do you currently have a government contract (or want one)? Did you know that if you don’t have a strong cybersecurity plan in place, you could be at risk of losing it? #CyberStrength will help ensure your business is in compliance with upcoming regulations. #CyberStrength will explore and challenge the business owner/IT professional to prepare and strengthen […]
Read More
 

5 Steps to Strengthening Your Cyber Presence

  • Posted by Mark Lupo
  • On February 19, 2018
“If you are not concerned about cybersecurity, you don’t know enough about the topic yet.” – Raef Meeuwisse Strengthening your online, cybersecurity presence is a balancing act along a continuum: On one end lies convenience, using technology to manage our lives by the simplest and quickest method possible and, at the other extreme, security, protecting our […]
Read More
 

Cybersecurity & Cybercrime for Small Business

  • Posted by Emily Ambrose
  • On November 27, 2017
I recently attended a presentation made by a manager from Microsoft.  The topic was cybersecurity and cybercrime.   It was eye opening and scary. She talked about what she called Level 100 and Level 200.   Level 100 Level 100 is what most business owners are pretty much aware of.  It involves protection, detection, and response.   […]
Read More
 

Small Business Cyber Security: What is it and why should you care?

  • Posted by Stacy Johnson
  • On July 11, 2017
We all hear about cyber-attacks, but what is cyber security? Cybersecurity encompasses the technologies and standard procedures designed to protect networks, computers, programs and data from attack, damage or malicious access. Cyber-attacks are an almost daily occurrence in the news these days. It seems many companies, schools and government entities are under constant attack. However, […]
Read More
 1

CyberStrength 2017 Conference

  • Posted by Mark Lupo
  • On January 30, 2017
According to Timothy Francis, a leader in the cyber insurance field, 62 percent of cyber-breach victims are small and medium-sized businesses. How to Protect Your Small Business as Cybersecurity Threats Rise Small Business Trends Jun 3, 2016 by Larry Alton As digital interaction increases, small businesses have become an increasingly attractive target for cyber criminals […]
Read More
 

The NIST Small Business Information Security Fundamentals Guide

  • Posted by Mark Lupo
  • On January 11, 2017
This Fundamentals guide aims to provide basic cybersecurity recommendations to small businesses. I have always stressed the necessity to improve cyber security posture for small businesses that are most exposed to threat actors across the world. Now the National Institute of Standards and Technology has released a cybersecurity guide to support small businesses in securing their […]
Read More
 

Simple Cyber Security Tips to Protect Your Online Accounts Against Hackers

  • Posted by Mark Lupo
  • On January 8, 2017
Celebrities go to great lengths to ensure their security, often traveling with bodyguards and living in gated communities. But when it comes to staying safe, there’s one place where being guarded is not guaranteed whether you’re a grandma or a gazillionaire: cyber security. The internet went nuts earlier this year when someone on Twitter noticed […]
Read More
 

CyberStrength 1.1: What is C.I.A.? (Understanding the Information Triad)

  • Posted by Mark Lupo
  • On December 27, 2016
By Mark R. Lupo, CBCP Most of us are familiar with the three letter combination, CIA, with our minds immediately going to visions of international espionage and the Central Intelligence Agency.  When it comes to our digital information, though, these three letters take on a different meaning.  Within the digital realm, these three letters, C.I.A., […]
Read More