About Eric Clay

This author has not yet filled in any details.
So far Eric Clay has created 35 blog entries.

Enterprise Phishing: Key Considerations for 2022

A data breach is unauthorized access or release of sensitive information. This can be anything from a customer's bank records to credit or debit card details, social security numbers, or passwords. Any information shared with a company and used for business purposes can be vulnerable to a data breach. Why Should Businesses Care About Data Breaches? Data breaches are an ever-present ...

2022-03-14T17:10:04-04:00March 14th, 2022|

The Threat of Ransomware Attacks and other Cyberattacks from the Ukraine Crisis

Since the Russo-Ukrainian conflict was initiated by Vladimir Putin on February 24th, 2022, the world has been watching. While much of the news coverage has centered around the physical battles being fought on the streets of Ukraine, cyberattacks have been a major component of Russia’s offensive initiative. Just weeks before Russia attacked Ukraine unprovoked, threat actors surreptitiously deployed several different ...

2022-03-03T10:46:56-05:00March 3rd, 2022|

Cybersecurity Risk Management — Your Questions Answered

Cybersecurity Risk Management — Your Questions Answered The digital world expands every day, and the power technology holds over the workplace grows with it. As technology permeates professional life and digital storage becomes the norm, the impact of cyber threats grows ever-greater. Without proper precautions, your organization faces great risk. How Does a Cybersecurity Risk Management Service Benefit Me? Even in ...

2022-02-28T09:57:34-05:00February 28th, 2022|

Log4J: The Importance of Layered Security

As many of you know, a vulnerability recently came to light called Log4Shell which takes advantage of a Java library vulnerability used by organizations and devices around the world. It has been labeled CVE-2021-44228. Many Fortune 100 tech companies rely on this library along with small and mid-sized organizations. Criminal actors are already racing to find ways to abuse this to ...

2021-12-16T15:53:47-05:00December 15th, 2021|

Cybersecurity for Financial Services

Cybersecurity for Financial Services: Best Practices The financial services industry is highly regulated and highly susceptible to cyberattacks by threat actors. Data breaches have grown larger, more frequent, and more expensive over time and the financial services industry has struggled to keep up with attacks. Financial institutions can spend an enormous amount of their revenue on their IT infrastructure. According ...

2022-02-16T21:40:46-05:00July 16th, 2021|

NIST Incident Response Plan: How to build your IRP

The NIST Incident Response Plan What happens if you implement a cybersecurity framework and still have an incident or a breach? Unfortunately in cybersecurity, you can never be 100% secure. You will always be at some risk of an incident. Even the most sophisticated cybersecurity systems in the world carry a degree of risk. However, an incident doesn’t have to be ...

2022-02-16T21:38:46-05:00July 12th, 2021|

Types of Penetration Testing: What you need to know

Types of Penetration Testing Securing your business and its data from cyber-attacks and threat actors has never been more challenging. This article will outline the different types of penetration testing, and how they can benefit your business. You need a strategic cybersecurity plan, experienced personnel, and well-managed cyber resources. End users and staff utilizing your business network need comprehensive security awareness ...

2022-02-16T22:58:52-05:00June 7th, 2021|

Network Security Tips for Small Business

Network Security Tips for Small BusinessWhile large corporate organizations are targeted by malicious actors on a regular basis, small businesses are the ones that are most in danger of losing money, data and even shutting their doors in the event of a cyber attack. Small businesses are ideal targets for threat actors because they often do not invest in network security ...

2022-02-16T23:08:57-05:00June 2nd, 2021|

How To Prevent a Distributed Denial-of-Service (DDoS) Attack: A Definitive Guide

DDoS attacks, among other cybersecurity and cloud security vulnerabilities, have increased in size, scope, and frequency in recent years. According to a Kaspersky Lab survey, DDoS attacks increased by 80% in the first quarter of 2020 relative to the same quarter of 2019. According to research, the typical DDoS attack in 2021 will use more than 1 Gbps of data, ...

2022-02-16T23:23:32-05:00May 17th, 2021|

What is a Data Breach? A Complete Guide

A data breach occurs when protected or private/confidential information is released to an untrusted environment, whether intentionally or unintentionally. Unintentional database exposure, data theft, information leakage, and data spill are also common terminology used to describe this type of cybersecurity breach. The repercussions of a data breach are often severe for individuals, enterprise businesses, small businesses, and government agencies. A minor ...

2022-02-16T23:20:13-05:00May 3rd, 2021|
Go to Top