Hard Lessons About Malware

Organizations are all working hard in collaboration to bring Atlanta’s critical systems back online but there is still a tremendous amount of work to be done and some serious lessons to be learned.

Let’s Talk About Penetration Testing.

Heaps of gratitude to Dawid Balut, Mattia Campagnano, Kimber Dowsett, Chris Roberts + Georgia Weidman for sharing their well-grounded thoughts on an often polarizing topic.

SMB + Startup CyberSecurity

I recently assembled + moderated a global panel of experts from Europe, Canada + the US to discuss Information Security for startups + small/medium-sized businesses.

What is Resilience?

Resilience is being prepared to respond to unplanned events of all kinds, having a plan to manage those events in effective ways to protect your reputation + bottom line. Here’s some tips for how to design your Resilience Strategy.

The GDPR is Coming

The General Data Protection Regulation goes into effect on May 25 this year, introducing the biggest change to data protection law in Europe in more than 20 years. What does it mean for businesses in the U.S.?

Antivirus vs. Anti-Malware: What’s the Difference?

You may wonder, “I have antivirus installed so I’m good, right?” That’s a good thing but not good enough to protect against the more sophisticated types of threats we see today. Keep in mind that viruses are also a type of malware among several common types that anti-malware detects better than more traditional antivirus. Some of…

Resilience: Insights from Live and Simulated Incident Response

Resilience Strategy can only truly be tested during and in the hours, days, and weeks following a cyber attack, simulations can help define its strengths + weaknesses prior to an attack in quantifiable ways, saving precious time, money, resources, and reputations. It also builds less quantifiable things like trust, morale, and confidence.

Don’t Just Click on the Link!

Beware of links, especially shortened links and especially this time of year Don’t just click on the link! (Especially this time of year). Keep these ideas in mind next time you’re about to click on some random link you got over social media or email.

Cyber Security is Dead. Time to Build Our Cyber Resilience Strategy.

Cyber Resilience Strategy is not a nice-to-have. The illusion of Cyber Security is gone. Cyber Security incidents will disrupt your business. As leaders, we’re responsible to do business confidently knowing that, when Cyber Security events disrupt our business, our teammates, partners, and clients can count on us to lead the way through.

Your Defense Needs a Good Offense

WIMZKL was recently engaged in a forensic investigation. The biggest lesson? Teams that aren’t balancing their defensive practice with offensive fluency, and frequently testing their own defenses, will be no match for attackers who are iterating, evolving and learning exponentially faster.

Transform Your Weakest Links Into Your Greatest Assets.

IBM’s Threat Intelligence Index verifies that humans are still the weakest links within organizations and play the major role in making cyberattacks successful. How do we help turn this around by transforming them from our weakest links into our greatest assets for protecting our organizations against cyberattacks?

Hackers Hate When You Do This

Hackers hate and avoid organizations with a culture that values and actively promotes Cyber Resilience Awareness. Their employees don’t make mistakes easily like organizations without one.