Skip to content
Blog Contact Us
Delta Risk logo
  • SOC-as-a-Service
    • SOC-as-a-Service Overview
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
  • ActiveEye Platform
  • Security Services
    • Security Services Overview
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
  • Resources
    • Cyber Security Resources
    • CISO Guidebook
    • Data Sheets
    • Events
    • Videos
    • White Papers
  • About
    • About Delta Risk
    • Board
    • Leadership
    • News
    • Careers
    • Partners
  • Blog
  • Contact

Author: John LeBrecht

How to Deal with Ransomware in 2020

How to Deal with Ransomware in 2020

August 14, 2020 | by John LeBrecht

Ransomware incidents show no signs of going away any time soon. Companies and governments continue to be faced with a tough dilemma: pay the ransom or rely on a contingency plan to regain access to critical files and systems. In this blog, we’ll discuss how to deal with ransomware in 2020 and what you can… Read More

Categories: Ransomware | Tagged: info sec, information security, malware, ransomware, ransomware attacks, security controls
Image of a computer, on a desk and a mouse.

How Regular Cyber Security Assessments and Audits Help Your Organization

May 7, 2019 | by John LeBrecht

Understanding your weaknesses through regular cyber security assessments and audits is critical. Without them, it’s difficult to withstand cyber attacks and protect your organization. As the wise Japanese author Shusaku Endo noted, ““Every weakness contains within itself a strength.” Knowing your weaknesses helps you focus on what you need to do to improve your cyber security posture…. Read More

Categories: Cyber Security Strategy, Risk and Compliance
lower your security risk

3 Steps You Can Take Now to Lower Your Security Risk

December 7, 2017 | by John LeBrecht

Managing risk across an organization requires a lot of different things: setting strategy, determining tolerance, defining metrics. These are critical in your overall risk management efforts, and even more so in information security. But where do you begin? There’s no denying it can feel like a daunting task. It’s hard to make sure that information… Read More

Categories: Risk and Compliance | Tagged: cyber security policy, cyber security risk, information security, risk compliance, risk management, security risk
translating the ncwf

Translating the NCWF: What it Means and Why It Matters to Your Workforce

October 13, 2017 | by John LeBrecht

The theme for week two of National Cyber Security Awareness Month (NCSAM) focuses on what organizations can do to create a culture of cyber security within the workplace, including the use of the National Institute of Standards and Technology’s (NIST) Cybersecurity Workforce Framework. With new threats emerging every day, it’s important that everyone in the workplace understands… Read More

Categories: Cyber Security Awareness | Tagged: cyber security, nist, nist framework, security
RSS Feed

Recent Posts

  • New ActiveEye Features Speed Threat Response, Improve Productivity September 10, 2020
  • 5 Tips for Kickstarting Your Cyber Security Program August 28, 2020
  • 4 Cyber Incident Scenarios You Should Exercise and Test August 20, 2020
  • How to Deal with Ransomware in 2020 August 14, 2020
  • Our Best Cyber Security Blogs of 2020: Mid-Year Update July 29, 2020

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Malware
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
  • Uncategorized
Delta Risk logo
106 S. St. Mary's Street
Suite 601
San Antonio, TX 78205

Other Locations

Managed Security Services

  • SOC-as-a-Service
  • SaaS Application Security
  • Cloud Infrastructure Security
  • Network Security
  • Endpoint Security
  • ActiveEye Platform

Security Services

  • Services Overview
  • Cloud Security Services
  • Pen Testing
  • Incident Response
  • Compliance
  • Assessments

Company and Resources

  • Leadership
  • News
  • Resources
  • Blog

© 2025 Delta Risk | All Rights Reserved

Privacy Policy | Your California Privacy Choices | EO/AAE | Sitemap | Contact