Cybersecurity

Monday, 27 June 2022

Empowered Chats: Crypto and navigating today's world of modern assets

Written by The Rehmann Team

  Cryptocurrency – a term you’ve likely heard in recent years as its popularity continues to grow. Many individuals and businesses are eager to get a taste of this “digital gold.” However, before making a move, it’s important you understand cryptocurrency, how it fits within your portfolio, and what the future holds for this high-risk, high-reward asset. In this latest installment of Empowered Chats, we sat down with Jim Carpp, chief digital officer, and Simon Micakaj*, C(K)P, CHSA, retirement plan advisor, to discuss cryptocurrency and how to navigate today’s modern world of assets...

Published in Cybersecurity
Tuesday, 31 May 2022

Empowered Chats: A deep dive into cybersecurity planning

Written by Jim Bruxvoort

Rehmann recently held a webinar, Disruption Around Every Corner, which discussed the number of growing pressures on business such as labor shortages, supply chain issues, and mounting cybersecurity threats. As these pressures continue to grow around the world, businesses and individuals are feeling the financial impacts. In this installment of Empowered Chats, we sat down with Jim Bruxvoort, director of partnered technology services, to dive deeper into cybersecurity threats. What is a cybersecurity plan and how can being proactive with a plan protect your organization from these threats?..

Published in Cybersecurity
Tuesday, 31 May 2022

Managing cybersecurity solutions and risks with MSPs

Written by Jim Bruxvoort and Jim Carpp, CISA, CRISC, CIRM, CISM

Most businesses know that its people are its biggest asset, but, in today’s tech-crazed world, people can also be businesses’ weakest links when it comes to IT and cybersecurity concerns. There is a plethora of ways hackers will try to lure well-intentioned employees into traps that make their companies vulnerable. Managing IT and cybersecurity risks takes time, money and constant diligence—things that many businesses don’t have. That’s where Managed Service Providers (MSPs) come into play, offering businesses of all sizes a solution that pales in cost compared to the damage of a successful cybersecurity attack...

Published in Cybersecurity

Cyber insurance is intended to protect your business from internet-based risks and reimburse you for expenses incurred from experiencing a cyber incident. According to a recent Harvard Business Review study, ransomware attacks increased by 150% in 2020 and the average payout increased 82% between 2020 and 2021. Soberingly, current statistics indicate that 60% of small companies will close their doors within 6-months of a data breach or cyberattack. The need for cyber insurance is becoming increasingly clear for many small- to medium-sized businesses...

Published in Cybersecurity
Monday, 18 April 2022

Crypto: Navigating Today’s World of Modern Assets

Written by By Jim Carpp

By Jim Carpp   Cryptocurrency continues to be a hot topic of conversation as its popularity grows globally. In recent months, cryptocurrency made headlines from Super Bowl ad placements to world powers responding to the invasion of Ukraine by freezing Russia’s crypto assets, virtually cutting them off from a significant portion of the international economy. This has left many contemplating the importance of cryptocurrency as a component of the modern portfolio. Many advisors suggest that this is a great time for businesses to buy into the crypto market...

Published in Cybersecurity
Tuesday, 19 October 2021

Webinar | Cybersecurity at a Crossroads

Written by The Rehmann Team

Cybersecurity at a Crossroads When it comes to your organization's technology and security, you may be on the right track — you recognize that constant monitoring, testing, and updating of your organization’s defenses are critical — but technology is complex and evolving at a faster pace than most can keep up with. For many small- and medium-sized organizations, implementing foundational requirements like multi-factor authentication and performing cybersecurity assessments will make an impact, but that may not be enough. Did you know that every four years an organization can expect to get hit with a cyber incident? Are you driving your business forward with yesterday's technology and security at today's speed?..

Published in Cybersecurity
Tuesday, 05 October 2021

Manage vendors, manage risk

Written by By James Carpp, CISA, CRISC, CIRM, CISM

By James Carpp, CISA, CRISC, CIRM, CISM   In 2014, retailer Target suffered hundreds of millions of dollars of damage because of a cyberattack. For almost three weeks during the busiest shopping time of the year, approximately 40 million credit and debit card numbers were covertly collected by hacker-installed malware as shoppers spent at Target. It all happened because an attack on one of Target’s heating and cooling contractors yielded Target network credentials. Target did not segment the contractor’s network access, so the hackers had the keys to the kingdom...

Published in Cybersecurity
Tuesday, 05 October 2021

Preparing for cyberattacks is good business

Written by James Carpp, CISA, CRISC, CIRM | Paul Kennedy, CISA, CISSP, CISM, | Mark Spaak, CISSP

By James Carpp, CISA, CRISC, CIRM, CISMPaul Kennedy, CISA, CISSPMark Spaak, CISSP   The 2021 data safety report by technology firm IBM and the Ponemon Institute, an organization seeking to advance responsible data use and privacy management, is eye opening in both favorable and unfavorable ways. On the positive side, fully deployed artificial intelligence (AI) solutions were shown to decrease data breach recovery costs by 56%. That piggybacks off the 2020 report, which showed clear value in implementing fundamental IT defenses like an incident response team, business continuity plans, encryption, and employee training, to name a few. Taken together, it’s clear a well-rounded, comprehensive IT defense program delivers organizational value...

Published in Cybersecurity
Friday, 09 April 2021

Risk Report April 2021

Written by The Rehmann team

Microsoft Office 365 corporate users increasingly hacked by account takeovers A recent survey of over 1,000 security professionals working for mid- to large-sized corporations revealed that 71% of deployments experienced an average of seven account takeovers over the past year. Identity-based takeovers of legitimate user accounts are quickly replacing phishing as the most common mode of attack. Traditional defenses like multi-factor authentication have become less reliable. 58% of the survey security professionals see a widening gap between attackers and defenders, escalated by the continuing shift to the cloud and the rapid growth in remote work driven by the COVID-19 pandemic...

Published in Cybersecurity
Tuesday, 16 March 2021

Risk Report March 2021

Written by The Rehmann Team

Rehmann compiles Risk Report to help raise awareness of the risks you and your company could face — from fraud to cybercrime and more. We can help protect you against these threats. Crowdstrike’s latest report identifies heightened risks According to the Crowdstrike 2021 Global Threat Report, 2020 saw an escalation in both the number and scope of cyberattacks. Malicious actors honed new tactics and even formed alliances to help them penetrate targets more effectively...

Published in Cybersecurity
Page 1 of 3

Meet The Rehmann Team

Start typing a name ...
Searching for "{{nameQuery}}"...
Start typing an experience ...
Searching for "{{experienceQuery}}"...
Start typing a location ...
Searching for "{{locationQuery}}"...
Or view a list of team members

get rehmann expertise to drive your business in your inbox every week