Apr 13, 2022 | Cybersecurity & Risk Management, Technology
The technology and approach behind a cyberattack evolve daily, making you and your organization extremely vulnerable. But one thing is certain – weak security has a cost. Cyberattacks will manipulate and disable the critical infrastructure we depend on to live,...
Jan 28, 2022 | Technology, Cybersecurity & Risk Management, Cybersecurity Bulletin
Data Privacy Day is the international holiday to acknowledge the importance of data security for sensitive and personal information. And this year we’re recommending you take a few minutes of your day and reflect on how your organization handles sensitive data....
Jan 25, 2022 | Technology, Cybersecurity & Risk Management, Resources
Authentication is one of the pillars of cybersecurity. Nevertheless, weaknesses in its mechanism, or in the process around authentication, are still a common root cause for organizations of all sizes falling prey to online attacks. In 2021 alone, countless...
Dec 7, 2021 | Technology, Cybersecurity & Risk Management
How Vulnerable Are You to A Cyberattack? The short answer – extremely vulnerable if left unchecked. The technology and approach behind a cybersecurity attack evolves daily, putting everyone at risk. Equally concerning is the malicious intent behind...
Sep 16, 2021 | Change Capabilities Development, Change Management, Transformation
Business leaders are facing facts. The world has changed, and the pace of that change isn’t slowing down any time soon. No one can stand still and rely on the old ways of doing business. Disruption is now a constant, exacerbated by game-changing new technologies and a...