Tag Archive for: cybersecurity

Fortify Cybersecurity Webinar Session 9: CISA & CyberHawaii Incident Response Webinar

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.

Fortify Cybersecurity Webinar Session 8: Mobile Device & Remote Access Management Webinar

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.

CISA CyberHawaii – Convergence of Physical & Cyber Security

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.

CISA CyberHawaii Secure by Design Webinar

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.

CISA-CyberHawaii Encryption

The risk of data theft requires the use of AES level encryption for valuable data when it’s at rest and in transit. Various types of encryptions are available today in both hardware and software forms, and it is important for businesses to know how these work and what options they have for implementing them.

Mentorship

Password management is a fundamental control in a strong cyber security framework and can be effectively implemented by businesses of all sizes. Many who operate small or large businesses may not give passwords much attention and mistakenly assume using a password that is easy to remember will make their lives easier when they have so many other responsibilities. However, a simple password is easier for cyber terrorists to crack, while a longer, more complicated password that uses a combination of letters, numbers and symbols takes longer and can be the first line of defense against a cyber-attack. This is just the beginning what is necessary for basic password security.

Conversely, Multi-factor Authentication (MFA) may seem like a new technology that is out of the reach of most businesses as a security tool. Given the variety and frequency of cyber threats working to compromise online accounts, MFA is no longer a luxury. It provides an additional line of defense that can be implemented in businesses of all sizes. And it has matured to the point that even small businesses are able to implement it.

Security Leadership

Password management is a fundamental control in a strong cyber security framework and can be effectively implemented by businesses of all sizes. Many who operate small or large businesses may not give passwords much attention and mistakenly assume using a password that is easy to remember will make their lives easier when they have so many other responsibilities. However, a simple password is easier for cyber terrorists to crack, while a longer, more complicated password that uses a combination of letters, numbers and symbols takes longer and can be the first line of defense against a cyber-attack. This is just the beginning what is necessary for basic password security.

Conversely, Multi-factor Authentication (MFA) may seem like a new technology that is out of the reach of most businesses as a security tool. Given the variety and frequency of cyber threats working to compromise online accounts, MFA is no longer a luxury. It provides an additional line of defense that can be implemented in businesses of all sizes. And it has matured to the point that even small businesses are able to implement it.

Fortify Cybersecurity Education series

Password Management & MFA Webinar

Password management is a fundamental control in a strong cyber security framework and can be effectively implemented by businesses of all sizes. Many who operate small or large businesses may not give passwords much attention and mistakenly assume using a password that is easy to remember will make their lives easier when they have so many other responsibilities. However, a simple password is easier for cyber terrorists to crack, while a longer, more complicated password that uses a combination of letters, numbers and symbols takes longer and can be the first line of defense against a cyber-attack. This is just the beginning what is necessary for basic password security.

Conversely, Multi-factor Authentication (MFA) may seem like a new technology that is out of the reach of most businesses as a security tool. Given the variety and frequency of cyber threats working to compromise online accounts, MFA is no longer a luxury. It provides an additional line of defense that can be implemented in businesses of all sizes. And it has matured to the point that even small businesses are able to implement it.