Social Engineering and Enterprise Security

social engineering featured

Discussions about security and compliance disproportionately focus on businesses and enterprises, precisely because these organizations serve as central repositories for critical industrial or consumer information. Accordingly, regulations and best practices are often tied to securing this infrastructure, with consumers getting little to no attention. 

However, the reality of modern cybersecurity threats is that almost all major security breaches are related in one way or another to social engineering–that is, the manipulation of people to breach data systems. Unfortunately, that doesn’t seem like it is changing any time soon. 

 

Read More

What is IRS 1075?

irs 1075 featured

The federal government has strict and comprehensive regulations on how agencies handle constituents’ personal information. This is just as true for tax information. The IRS leans on established guidelines associated with federal security to dictate regulations for agencies that handle tax information and, by and large, treats that information as a sensitive and critical part of operations. These guidelines are housed in the robust regulatory document called IRS 1075. 

 

Read More

Michael Peters, Continuum GRC: “close proximity between working and personal computing spaces has put both at risk”

Michael Peters, Continuum GRC: “close proximity between working and personal computing spaces has put both at risk”

Following the continuous rage of the COVID-19 pandemic, organizations face a difficult task to secure the workload and devices of the employees scattered around the world.

As a home has become the new office, it unveiled serious organizational cybersecurity gaps. Experts say that simply installing antivirus software or encrypting traffic on a company-issued MacBook is not enough – companies need to actively monitor their attack surface and be aware of the risks they are exposed to. 

To discuss enterprise security, we invited Michael Peters, the CEO of Continuum GRC. Michael explains that to ensure that business operations are secure, organizations must be able to eliminate oncoming threats and have a clear view of their own cybersecurity landscape.

Read More