Cybersecurity

Tuesday, 19 October 2021

Webinar | Cybersecurity at a Crossroads

Written by The Rehmann Team

Cybersecurity at a Crossroads When it comes to your organization's technology and security, you may be on the right track — you recognize that constant monitoring, testing, and updating of your organization’s defenses are critical — but technology is complex and evolving at a faster pace than most can keep up with. For many small- and medium-sized organizations, implementing foundational requirements like multi-factor authentication and performing cybersecurity assessments will make an impact, but that may not be enough. Did you know that every four years an organization can expect to get hit with a cyber incident? Are you driving your business forward with yesterday's technology and security at today's speed?..

Published in Cybersecurity
Tuesday, 05 October 2021

Manage vendors, manage risk

Written by By James Carpp, CISA, CRISC, CIRM, CISM

By James Carpp, CISA, CRISC, CIRM, CISM   In 2014, retailer Target suffered hundreds of millions of dollars of damage because of a cyberattack. For almost three weeks during the busiest shopping time of the year, approximately 40 million credit and debit card numbers were covertly collected by hacker-installed malware as shoppers spent at Target. It all happened because an attack on one of Target’s heating and cooling contractors yielded Target network credentials. Target did not segment the contractor’s network access, so the hackers had the keys to the kingdom...

Published in Cybersecurity
Tuesday, 05 October 2021

Preparing for cyberattacks is good business

Written by James Carpp, CISA, CRISC, CIRM | Paul Kennedy, CISA, CISSP, CISM, | Mark Spaak, CISSP

By James Carpp, CISA, CRISC, CIRM, CISMPaul Kennedy, CISA, CISSPMark Spaak, CISSP   The 2021 data safety report by technology firm IBM and the Ponemon Institute, an organization seeking to advance responsible data use and privacy management, is eye opening in both favorable and unfavorable ways. On the positive side, fully deployed artificial intelligence (AI) solutions were shown to decrease data breach recovery costs by 56%. That piggybacks off the 2020 report, which showed clear value in implementing fundamental IT defenses like an incident response team, business continuity plans, encryption, and employee training, to name a few. Taken together, it’s clear a well-rounded, comprehensive IT defense program delivers organizational value...

Published in Cybersecurity
Friday, 09 April 2021

Risk Report April 2021

Written by The Rehmann team

Microsoft Office 365 corporate users increasingly hacked by account takeovers A recent survey of over 1,000 security professionals working for mid- to large-sized corporations revealed that 71% of deployments experienced an average of seven account takeovers over the past year. Identity-based takeovers of legitimate user accounts are quickly replacing phishing as the most common mode of attack. Traditional defenses like multi-factor authentication have become less reliable. 58% of the survey security professionals see a widening gap between attackers and defenders, escalated by the continuing shift to the cloud and the rapid growth in remote work driven by the COVID-19 pandemic...

Published in Cybersecurity
Tuesday, 16 March 2021

Risk Report March 2021

Written by The Rehmann Team

Rehmann compiles Risk Report to help raise awareness of the risks you and your company could face — from fraud to cybercrime and more. We can help protect you against these threats. Crowdstrike’s latest report identifies heightened risks According to the Crowdstrike 2021 Global Threat Report, 2020 saw an escalation in both the number and scope of cyberattacks. Malicious actors honed new tactics and even formed alliances to help them penetrate targets more effectively...

Published in Cybersecurity
Tuesday, 08 December 2020

Deals and steals: Preventing hackers this holiday season

Written by Ken Zimmer

As online spending and sales begin to pop up across the country this holiday season, so too will cyber security threats. Businesses and individuals alike should err on the side of caution while season’s greetings are in the air and online shopping traffic is high.  The first line of defense against cybersecurity threats is knowledge. When paired with a right-sized security program, an understanding of how hackers may attempt to access your information can go a long way toward keeping your data protected...

Published in Cybersecurity
Monday, 02 November 2020

Risk Report November 2020

Written by Miranda Junga

Join us on Nov. 12, 2020 for our 7th annual Cybersecurity Conference  Hosted virtually for the first time, this historically in-person, Michigan-based event is an exciting opportunity for organizations throughout the state and beyond to learn best practices to prevent, detect, and respond to cyber threats.   Featuring a keynote presentation by veteran IT security thought leader Corey Nachreiner, chief technology officer for WatchGuard Technologies, Inc., this event gives attendees the chance to interact with a panel of professionals, participate in live Q&A sessions, and join a variety of business and technical track sessions on topics including: Navigating the 2020 Cyber Threat Landscape While Working from Home (Keynote) The Inclusion Journey: Addressing Culture to Support a Diverse Workforce (Panel) Boosting Your Organization's Cybersecurity Readiness The Future of the Purple Team 5 Predictions: How the Coronavirus Will Change the Future of Work Identity is the Perimeter, but Risk is the Gatekeeper New & Emerging Threats, the Changing Landscape of Threats, and How Hackers Adapt And so much more!..

Published in Cybersecurity
Monday, 26 October 2020

Making cybersecurity an asset in your business

Written by Jessica Dore, CISA

Cybersecurity is “mission critical” because of its profound effects across a business. In some industries, it means everything. And for C-level tech executives, cybersecurity can make or break a career. So, it’s surprising to see how many businesses aren’t prepared for attacks...

Published in Cybersecurity

More remote workers are prompting employers to critically consider cybersecurity protocols while keeping employees engaged and connected. From assessing remote capabilities and setting expectations, to implementing procedures and preventing cyber breaches, the following steps will help ensure remote workforce success moving forward. Assess your company’s remote work capabilities. For many companies, this shift to remote working happened almost overnight, leaving little time for adequate planning...

Published in Cybersecurity
Thursday, 23 July 2020

Keeping your organization safe from data exfiltration and other growing cybersecurity threats

Written by Mark Spaak, Director of Support Services

One law firm, eager to quickly switch to a remote workforce as the pandemic triggered stay-at-home orders and office shutdowns, pulled retired laptops and desktop computers from storage for employees to use. Another common response to teams no longer working onsite: allowing employees to connect to their desktops back in the office from home – exposing the system outside the firewall without using a VPN (Virtual Private Network).  In both scenarios, though understandable given the quick turnaround companies faced in keeping operations moving in the early days of COVID-19, put businesses at higher risk for cyberattacks. Without proper safeguards in place, an organization is being more reactive than proactive – leading to its information technology environment being at risk of significant compromise...

Published in Cybersecurity
Page 1 of 2

Meet The Rehmann Team

Start typing a name ...
Searching for "{{nameQuery}}"...
Start typing an experience ...
Searching for "{{experienceQuery}}"...
Start typing a location ...
Searching for "{{locationQuery}}"...
Or view a list of team members

get rehmann expertise to drive your business in your inbox every week