Cybersecurity

Sendmarc Webinar Protect your business against impersonation & phishing attacks Recording

Sendmarc Webinar Protect your business against impersonation & phishing attacks Recording Access

Are you worried about cybercriminals using your brand to impersonate your employees and steal sensitive information? You’re not alone. In today’s digital age, it’s easier than ever for fraudsters to mimic the look and feel of your company’s emails, making it difficult for recipients to spot the difference.  But don’t let that scare you. You […]

Sendmarc Webinar Protect your business against impersonation & phishing attacks Recording Access Read More »

Data Security Safeguards Rules Extended to Additional Industries

By Nathaniel C. Gravel, CISA, CISM, CRISC The Graham-Leach-Bliley Act (GLBA), formally recognized as the Financial Modernization Act of 1999, has long served as a regulatory keystone in the United States financial sector. Originally conceived to break down barriers between commercial banks, investment banks, and insurance companies, the Act has undergone several expansions and interpretations

Data Security Safeguards Rules Extended to Additional Industries Read More »

Cyber Insurance Digital Graphic

12 Policies & Practices You May Need to Adopt to Be Eligible for Cyber Insurance

By Nathaniel C. Gravel, CISA, CISM, CRISC In today’s digital landscape, cybersecurity is not just an IT issue but a significant business risk. With cyber threats growing more sophisticated, businesses are increasingly turning to cyber insurance as a way to mitigate the financial impacts of cyberattacks and data breaches. However, obtaining cyber insurance isn’t as

12 Policies & Practices You May Need to Adopt to Be Eligible for Cyber Insurance Read More »

Baseline Security Measures for Cloud Environments

By Nathaniel C. Gravel, CISA, CISM, CRISC Securing cloud-based data must be a top priority for organizations that increasingly rely on cloud services for their daily operations. The rapid growth of cloud computing and the vast amount of sensitive information stored in these environments make it crucial to implement robust security measures to protect your

Baseline Security Measures for Cloud Environments Read More »

Top Cyber Threats in 2023 Webinar Recording Access

When it comes to cyberattacks, every business is a target. And the attacks are getting more sophisticated and devious every day. What can you do to protect your company from becoming the next victim? The first step is educating yourself about the most common cyber threats currently menacing businesses like yours. In this webinar recording,

Top Cyber Threats in 2023 Webinar Recording Access Read More »

Keep Your Data Safe When Working from Home

By Nathaniel C. Gravel, CISA, CISM, CRISC The second week of January has been designated as National Home Office Safety & Security Week. But keeping your computer, network and files secure while working remotely is a 24/7/365 task. Here are eight important steps to take to help ensure your “home work” is not compromised by

Keep Your Data Safe When Working from Home Read More »

Articles

Is Office 365 Vulnerable to Cyberattack?

By Nathaniel C. Gravel, CISA, CISM, CRISC Hundreds of thousands of organizations in the U.S. and around the world rely on Microsoft’s Office 365 software suite to run their businesses. But recent events have shown that even this highly regarded software is vulnerable to penetration by increasingly sophisticated methods used by cyber criminals. The biggest

Is Office 365 Vulnerable to Cyberattack? Read More »

Articles

Where to Start with Cybersecurity

By Nathaniel C. Gravel, CISA, CISM, CRISC With an estimated 2,200 cyberattacks taking place each day – one every 39 seconds – the task of creating and deploying a defensive strategy for your business can be intimidating. Still, the threat is too great to ignore, not to mention the fact that most states have strict

Where to Start with Cybersecurity Read More »

Articles

How Simulated Phishing Can Save Your Business

By Nathaniel C. Gravel, CISA, CISM, CRISC The number one cause of cybersecurity breaches in the U.S. is human error. Statistics show that 70% of all cyber intrusions are caused by somebody clicking on the wrong link, downloading an infected attachment, or responding to an email that looked legitimate but was a deception. Collectively known

How Simulated Phishing Can Save Your Business Read More »

Articles

Cybersecurity Threats on the Rise: What Every Organization Needs to Know and Do to Mitigate Risk Webinar Recording Access

This webinar hosted by Gray, Gray & Gray’s Hank Wolfson and cybersecurity expert Nathaniel Gravel, provided a vital look at the cyber threats aimed at businesses, the most important actions to take to protect yourself, and an understanding of how current global affairs have spiked the risk of cyberattack for American companies. Here are just some

Cybersecurity Threats on the Rise: What Every Organization Needs to Know and Do to Mitigate Risk Webinar Recording Access Read More »

Scroll to Top