[Infographic] Simple Steps to Online Safety: 31 Days of Cyber Security Tips

October is right around the corner, and that means National Cyber Security Awareness Month (NCSAM) is practically here too! We are excited to be a 2017 champion. Throughout NCSAM, we will post blogs that address weekly themes to further educate and spread awareness around important cyber security topics. The week one NCSAM theme focuses on “Simple Steps to… Read More

today's insider threats

What History Teaches Us About Today’s Insider Threats

While insider threat attacks continue to make waves in the news, the origins of insider threats go back decades and even centuries. Insiders have emerged in religious texts, insiders have brought down empires, and insiders have stolen money and information from various organizations. There are few industries or organizations that have escaped the threat from their own people… Read More

cyber hygiene tips

Top 10 Cyber Hygiene Tips for Healthcare IT and Security Professionals

In the hospital setting, there is no tolerance for poor hygiene. Frequently washing your hands and using hand sanitizer can drastically decrease the chances of contamination, the spread of disease, and infection rates. It’s just as important to commit to cyber hygiene to slow down attackers who are looking to infect your mission-critical systems. In… Read More

healthcare security experts

Healthcare Security Experts Recommend Key Steps IT Leaders Can Take to Protect PHI, Business Continuity

Last week, we hosted a webinar to discuss the challenges healthcare operators face when responding to cyber security incidents. Our presenters, Michael McKinley, Vice President and General Manager at Delta Risk, Chris Holda, Senior Healthcare IT Consultant, Huntzinger Management Group, and Ed Kopetsky, Chief Information Officer at Stanford Children’s Health and Advisor with Next Wave Health Advisors, provided… Read More

threat monitoring

New 2017 Threat Monitoring, Detection, and Response Report Shows Dramatic Rise in Threats

Results from the new 2017 Threat Monitoring, Detection, and Response Report indicate that companies continue to lose ground to emerging cyber threats. Over the last six months, there has been a dramatic rise in ransomware attacks and insider threat attacks that have led to data loss and reputational harm. Delta Risk partnered with the Information Security Community on LinkedIn to develop the in-depth… Read More

incident response best practices

Incident Response Best Practices: What You Can Expect During the First Call

Imagine this scenario: you’ve just discovered your network has been breached. You need to get a handle on the situation quickly but you’re still trying to figure out what happened. What are the incident response best practices you should follow? As cyber security consultants, we know the first few moments of an incident can be highly… Read More