Defeating Ransomware

Well, it seems the bad guys have won another one with the recent 75 bitcoin ransom payout to unlock the Colonial Pipeline. And despite early indications with the shutdown that other methods would be taken to restore service, it seems that sometimes crime does actually pay. This beg the question of if there are best practices, we should be implementing to take stronger steps towards prevention?

BLOG May 31

How Can Security Assessments Help Your Business

Security should not be a taboo subject for the average business owner, especially when it comes to your information assets. Given that we most live in a knowledge-based economy and every organization relies to some degree on the IT infrastructure, it stands to reason that even a small breach could have catastrophic consequences. So, what should the average business do to protect itself?

BLOG May 24

National Insurance Providers Need The Assurance Of A Security Assessment

National insurance providers are a prime target for cybercriminal because of the volume of personally identifiable information (PII) stored for millions of customers all in one location. This begs the question of how secure is this information and what steps are being taken to ensure your insurers are being protected? This is where periodic security assessments come into play.

BLOG May 17

Software Solution Provider Security Assessments Revisited

Software solution providers have pervasive and stringent access control requirements, but all too often legacy applications haven’t been keeping up with the latest security best practices and this is now opening new vulnerabilities that may be exploited by industrious cyber criminals.

BLOG May 10

The Role Of Security Assessments In Your Red Team Strategy

The “battle” for the security of your digital assets is an ongoing effort to stay ahead of cyber criminals, hackers and assorted bad actors. The concepts of “battle” or “military incursion” also give rise to adopting techniques across industry boundaries. Specifically, the concept of war-gaming the security infrastructure through Red Teams.

BLOG May 03

Payment Solutions Security Assessments Revisited

Retail commerce is the backbone of our economy so it should come as no surprise that cyberthreats are often directed to payment systems and payment solution providers. This brings us to a discussion on the PCI Standard which is mandated by the card brands but administered by the Payment Card Industry Security Standards Council. The standard was created to increase controls around cardholder data to reduce credit card fraud so assessing compliance and potential vulnerabilities has become a defacto requirement.

BLOG Apr 26

Health Insurance Security Assessments Revisited

Courtesy of these exceptional times we live due to the global response to COVID-19, it should come as no surprise that healthcare companies are under more attack from cyber criminals for claims and insurance related infrastructure. It should also come as no surprise that “an ounce of prevention is worth a pound of cure” so taking the steps to ensure your security strategy is comprehensive enough to meet these extra burdens becomes paramount.

BLOG Apr 19

nVisium Bluescape Case Study

When scaling operations and building new infrastructures, it is vital that organizations test and evaluate how secure applications are from the ground up before they are implemented, as the security of a particular architecture or infrastructure should never be an afterthought. nVisium takes great pride in working with companies like Bluescape, who have created a platform that helps empower the remote workforce, particularly in present times where these collaborative environments are critical.

BLOG Apr 12

Compliance Isn't A Dirty Word

If you are old enough to remember George Carlin’s comedy sketch on the 7 words you can’t say on TV, then you are probably scratching your head at how far we have come on what is considered a dirty word and what is now commonly accepted. If you are a CISO then there are probably a few other words you would like to add to that list with “compliance” being at the top.

BLOG Apr 05

Cyber Security Risk Management - Exposing and Fixing Security Vulnerabilities

Can you believe we are already at the end of Q1 2021? Despite the pandemic and the crazy working requirements of the last 12+ months, it seems that time is still moving at a pace beyond imagination. This of course hasn’t stopped cyber criminals from finding new and creative ways to penetrate current security technologies and techniques. It should come as no surprise that your understanding of cyber security risk management and how to expose and fix security vulnerabilities will mean the difference between success and failure.

BLOG Mar 29