Cyber is dead. Long live Resilience Strategy.

Cyber Resilience Strategy is not a nice-to-have. The illusion of Cyber Security is gone. Cyber Security incidents will disrupt your business. As leaders, we’re responsible to do business confidently knowing that when unplanned events (like cyber attacks) disrupt our business, our employees, partners, and clients can count on us to lead the way through. Firewalls…

Prepare to Meet Fraud

What you may not understand about Cyber Insurance, even if you already have some, can cost you more than risking not having any at all. There is a shift underway that impacts business + reputation when cyber incidents take place, beyond even GDPR. Please make time to read this.

SMB + Startup CyberSecurity

I recently assembled + moderated a global panel of experts from Europe, Canada + the US to discuss Information Security for startups + small/medium-sized businesses.

What is Resilience?

Resilience is being prepared to respond to unplanned events of all kinds, having a plan to manage those events in effective ways to protect your reputation + bottom line. Here’s some tips for how to design your Resilience Strategy.

Resilience: Insights from Live and Simulated Incident Response

Resilience Strategy can only truly be tested during and in the hours, days, and weeks following a cyber attack, simulations can help define its strengths + weaknesses prior to an attack in quantifiable ways, saving precious time, money, resources, and reputations. It also builds less quantifiable things like trust, morale, and confidence.

Cyber Security is Dead. Time to Build Our Cyber Resilience Strategy.

Cyber Resilience Strategy┬áis not a nice-to-have. The illusion of Cyber Security is gone. Cyber Security incidents will disrupt your business. As leaders, we’re responsible to do business confidently knowing that, when Cyber Security events disrupt our business, our teammates, partners, and clients can count on us to lead the way through.

Your Defense Needs a Good Offense

WIMZKL was recently engaged in a forensic investigation. The biggest lesson? Teams that aren’t balancing their defensive practice with offensive fluency, and frequently testing their own defenses, will be no match for attackers who are iterating, evolving and learning exponentially faster.

Transform Your Weakest Links Into Your Greatest Assets.

IBM’s Threat Intelligence Index verifies that humans are still the weakest links within organizations and play the major role in making cyberattacks successful. How do we help turn this around by transforming them from our weakest links into our greatest assets for protecting our organizations against cyberattacks?

Hackers Hate When You Do This

Hackers hate and avoid organizations with a culture that values and actively promotes Cyber Resilience Awareness. Their employees don’t make mistakes easily like organizations without one.

First, the bad news. Then, the really good news.

As humans, our default instinct is to ignore things that threaten us until they impact us directly even as we are very weak and vulnerable to them. That’s why hardly anyone has an estate plan or business continuity strategy. The real problem is this: the less we care, the more vulnerable we are.

What’s Your Password?

This is funny. Sort of. When Jimmy Kimmel went streetside and asked people, “What’s your password?” in a funny, notably exaggerated way, he revealed how easy it is to manipulate people to get their private information.

Ransomeware: To pay or not to pay, that is the question.

By now, after the global spread of WannaCry, we can use ‘ransomewared’ as a transitive verb. I may be trying to make light of something nasty here because it’s nasty stuff that has ruined the day for many thousands of people. I hope I never have to help anyone ever navigate their way out of such an insidious trap ever again. Unlikely, that. So, here is some solid, step-by-step advice to take should the gods forbid you ever find yourself in that most unsavory situation.

Are Macs safe from Ransomware?

Nope. The first known ransomware attack on Macs, known as “KeRanger”, was downloaded more than 6,000 times before the threat was contained, back in early 2016. While that number is small compared to the number of ransomware attacks on computers running Windows, these threats are growing and we haven’t seen the worst of them, yet. We can expect to see more attacks on Macs. As more and more people are using them than ever before, those-so-inclined are always finding new ways to exploit Macs.