New York State Cybersecurity Regulation

New York cybersecurity

Effective March 1, 2017, the Superintendent of Financial Services promulgated 23 NYCRR Part 500, a regulation establishing cybersecurity requirements for financial services companies. August 28, 2017 marks the deadline for implementation.See more key dates of the regulation here.

Red Flags of Phishing Attacks

Social Engineering is information securitys weakest link.– Kevin Mitnick ‘The Worlds Most Famous Hacker IT Security Consultant 1

Back in the early days of the Internet, phishing emails were full of typos and laden with obvious clues—appeals from faraway princess or rich relatives you never knew you had. These were very easy to spot.

Back Up to Move Forward

back up

IT leaders already know that you need to have a range of data recoverability options in place in case of a cyberattack? According to ESG, backup should absolutely be the foundational cornerstone of every data protection strategy.

Top 10 Clicked Phishing Emails

Add heading

Our security awareness training partner, KnowBe4, recently released the Top 10 Global Phishing Email Subject Lines for Q2 2017 report. The list below shows the subject lines of the phishing emails that are top clicked of all global phishing emails:

Disaster Recovery Strategy in 5 Steps

The Five Steps

Disaster Recovery is important, especially to SMBs. The big guys can take an occasional hit—but smaller guys can’t afford the loss. The tangible costs of a downtime-inducing disaster are real, and for some, they’re devastating. A recent survey of IT professionals produced some sobering expectations…

Watch Your Back: Why You Must Have A SIEM

Watch Your Back

Technology creates a lot of information, and it typically leaves a record of what it has performed in log files. Whether it’s your router, switch, server, virtualization platform, cloud provider, smart phone, or printer a trail of events and information is created like a receipt you would get from grocery shopping. Unfortunately, the logs are often forgotten, or commonly never analyzed unless there is a major problem. E