Close Contact Us
Tap Here To Call Us

Articles Posted in Human Firewall

Updated:

Social Media Can Be Hazardous to Your Cybersecurity Health Part 2: Solutions

Public Service Announcement: Social media use increases your cybersecurity exposure. Share appropriately. If that were all it took. In my earlier post, I described how casual use of social media (that is, failure to take into account its impact on privacy and security) can put your company’s information security profile…

Updated:

Cyber Risk and Internal Accounting Controls: How Should Boards Respond?

The SEC warns public companies that lax cybersecurity practices could violate rules governing internal accounting controls, and offer nine scams as cautionary tales. The SEC has become increasingly active when it comes to cybersecurity. Last month, it issued an investigative report about Business Email Compromises (BCEs) involving nine public companies…

Updated:

Cyber Resiliency: Designing for Disaster

Cybersecurity is a method to protect your data and systems. Cyber resiliency is a way of doing business in the face of the inevitable. When Hurricane Michael struck the Florida Panhandle earlier this month, it wiped away wide swaths of Mexico Beach, a coastal town on the Gulf of Mexico.…

Updated:

Responding to Ransomware

Agreeing to ransom terms is a losing proposition; spend your time and energy preparing for an attack. Ransomware attacks are on the rise, partly because of the ease and anonymity of crypto-currencies. In a typical ransomware attack, cyber criminals invade a computer system and encrypt key data, then threaten to…

Updated:

A Field Guide to “Social Engineering” Cyber Scams

Any hobbyist will tell you that a proper guide is a must to mastering a craft.  However, a hobby is a part-time occupation; most of us know that our businesses need full-time attention. Because cybersecurity threats can impact core business activities, addressing those threats, especially those known as “social engineering”…

Updated:

The Four Horsemen of Cryptocurrencies: Volatility, criminal activity, security issues, and human error

  Welcome to the second article in our series of blogs about blockchain technology and its impact on business practices, corporate governance and cybersecurity.     In Robert Braun’s article, Cryptocurrencies – Does the Next Big Thing have Staying Power?, published by FinTech Weekly, he describes four challenges that arise…

Updated:

Could We Have Seen This Coming? – The Importance of HR to Cybersecurity

Today’s blog is written by my partner, Louise Ann Fernandez, Chairperson of JMBM’s Labor & Employment Group. Louise Ann helps companies put hiring and employment policies in place — and develops training programs — that help to protect the business against cyber threats.  — Michael A. Gold Could We Have…

Updated:

Beyond Breach Notification

Ever since California adopted the nation’s first breach notification law in 2002, companies that have suffered a data breach have focused on whether and how to notify their customers, employees and others of the nature and extent of the breach.  California’s law has been amended multiple times, and has been…

Updated:

Middle-Market Companies Require a Customized Approach for Successful Cybersecurity

Middle-market companies have cultures, goals and business needs that are distinct from larger firms, and nowhere is that more true than with cybersecurity. Fortune 500 companies and brands with household names are much more likely to recover their reputations following a data breach.  While breaches are costly in financial terms…

Contact Us