Defense In Depth: 10 steps to build a secure foundation against cyber attacks

Defining and communicating your Business’s Information Risk Strategy is central to your organization’s overall cyber security strategy. We recommend you establish this strategy, including the nine associated security areas described below, in order to protect your business against the majority of cyber attacks. 1. Set up your Risk Management Strategy Assess the risks to your […]

API SECURITY BEST PRACTICES

API Security Best Practices in 2022

API SECURITY BEST PRACTICES 2023 Introduction APIs are critical to business success. The focus must be to ensure their reliability and security. A majority of respondents to a 2021 Salt Security survey said they had delayed the launch of an app due to API security concerns. Top 10 Security Risks of APIs 1. Insufficient logging […]

10 Ways To Protect Your Company From A Data Breach

Data breach

A Tragic History Of Data Breaches We have suffered from high profile data breaches at many big-name retailers, hundreds of millions of consumers have had their credit and debit cards compromised, not to mention other personal information.  The consequences of suffering data breaches caused major brand damage and range from consumer mistrust, a drop in […]

What habits can you develop to enhance your internet privacy?

I regularly teach on this subject professionally for organizations as large as 70,000 employees, and it’s one of my favorite subjects to help people better understand. Let’s go over a few Good Security Habits to help you stay safe. There are some simple habits you can adopt that, if performed consistently, will dramatically reduce the […]

4 ways you can secure the Internet of Things (IoT)

man in black holding phone and working on computers

Let’s talk briefly about Securing the Internet of Things The Internet of Things is becoming an important part of everyday life.  Being aware of the associated risks is a key part of keeping your information and devices secure. The Internet of Things refers to any object or device that sends and receives data automatically through […]