cybersecurity

Small Utilities Are Unprepared To Deal With The Next Crisis, But Its Never To Late

Small Utilities Are Unprepared To Deal With The Next Crisis, But Its Never To Late

Cyberattacks against the energy sector are growing in both number and sophistication. With more than a dozen small utilities located near critical infrastructure targeted in the past year, there are steps that companies can take to minimize their risk and protect their consumers despite the lack of budget or resources.

Cyber-security Is A Business Risk, not an IT problem – Don’t get caught offguard!

Cyber-security Is A Business Risk, not an IT problem – Don’t get caught offguard!

Physician groups, school districts, small utilities, small businesses, local governments are all vulnerable to a data breach. Budgets and staffing should never be a barrier to prepare for an attack. Crisis management can help reduce your risk and help with proper incident response.

Cyber-terrorism is a reality, How are you going to deal with it?

Cyber-terrorism is a reality, How are you going to deal with it?

It is not a matter if you will be hacked it is a matter of when and am I prepared.In preparing for a crisis around cyber terrorism?  know the law and which laws dictate how your company responds and to whom. Know what you want to say and how quickly you will respond after a reach. Know the influencers and key stakeholders to make sure you to not ignore key people in responding to an attack

Naked & Exposed We Are All At Risk Of Attack, But Are You Prepared?

Naked & Exposed We Are All At Risk Of Attack, But Are You Prepared?

From toys to medical devices, the world is a more connected place, exposed to hackers and other threats, that can result in serious injury or damage, both physically and to your financially to your reputation. We are naked and exposed and vulnerable to the risks of living in a connected life in the Internet of Things (IoT).  While politically fragmented, Friday's attack proves our world is more connected than ever.  

Limiting Reputational Risks When Information Is Breached

Limiting Reputational Risks When Information Is Breached

Businesses today do not have the luxury of waiting 30 days let alone thirty minutes to notify its stakeholders of a breach in cyber security. CEOs along with the CMO, CIO and CLO must work to create effective and swift protocols to deal with data breaches to limit legal liability risk and risk to the company’s reputation.

ATTACKED! What you can do to protect your REPUTATION

ATTACKED! What you can do to protect your REPUTATION

When your data is breached or you system is hacked, the best response is a quick response to minimize damage to your reputation.