The data on your shared drives and mobile devices is rich with personal and business information, much of which is in the form of unstructured data . If it fell into the wrong hands, it could quickly become a security issue. The most significant sources of unstructured data are email and documents that get created… Read More
[Blog] 7 Surprising Ransomware Statistics Detailed in New Infographic
Did you know that the estimated annual global revenue from ransomware attacks is predicted to reach $1 billion in 2019? The Delta Risk team just released a new infographic with surprising ransomware statistics. The infographic includes details on monetary cost and the frequency of attacks. If your organization or business is concerned about ransomware attacks or just… Read More
Reducing Insider Threat Risk Through IAM
Insider threats have been around since the dawn of time, and they’ve always been a challenge to prevent and detect. That’s what makes reducing insider threat risk so difficult. The digital age, which has given much of the world’s population fast and easy access to information from practically anywhere, has only compounded the issue. In… Read More
Challenges in Implementing a Continuous Monitoring Plan
Developing and implementing a continuous monitoring plan (CM) is a crucial part of your cyber security program. A CM plan should help you identify if your organization’s security controls continue to be effective over time, as things change and evolve. Having a CM plan is an essential part of the National Institute of Standards and… Read More
How to Design an Effective Cyber Exercise
In today’s blog, we’ll discuss how to design an effective cyber exercise to follow up on our post on the benefits of cyber exercises and how to get approvals. A good starting point is to consider why you want to have an exercise. A lot of times, cyber security teams and even upper management consider cyber… Read More
What Are the Benefits of Cyber Exercises?
We’ve written several blogs previously about how cyber security exercises can keep you in shape and why cyber security exercises work. In today’s post, we’ll discuss some of the other benefits of exercises, and discuss how to go about getting approvals. Do you need help developing a cyber exercise? Get expert assistance from Delta Risk. Contact us now…. Read More