Category: Cybersecurity

Top 5 Helpful Tips for Cybresecurity Awareness Month
Cybersecurity

Top 5 Helpful Tips for Cybresecurity Awareness Month

With shorter days and falling leaves, apples and pumpkins ready for harvest, and Halloween just around the corner, October is one of our favorite times of year here at BTB Security. Much as we love the thrills and chills that skeletons, witches and spiderwebs bring, we also appreciate the fact

Read More »
DON’T FALL VICTIM TO CYBERSECURITY SCARE TACTICS
Cybersecurity

DON’T FALL VICTIM TO CYBERSECURITY SCARE TACTICS

Walk into any major cybersecurity conference, and you’ll feel like you are walking into the trailer for a horror movie. Scary threats and psychopathic criminals are everywhere, the vendors say, as they try to convince you that only they have the tools to keep you safe. The only thing that’s

Read More »
THINGS THAT GO BUMP IN THE NIGHT…PART 4
Cybersecurity

THINGS THAT GO BUMP IN THE NIGHT…PART 4

Cybersecurity month is coming to an end and Halloween is almost upon us but we still have one “monster” left to unmask. In the final installment of our series on “Things that go bump in the night”, we look at the devious “email”. It seems so harmless: messages from your boss,

Read More »
THINGS THAT GO BUMP IN THE NIGHT… PART 3
Cybersecurity

THINGS THAT GO BUMP IN THE NIGHT… PART 3

So, we’ve seen that not all monsters are as fearsome as they may seem on the surface, but what about the reverse? How do you know when something that seems like no big deal actually poses a huge risk to your organization’s cybersecurity. In our third installment of our “Things that

Read More »
THINGS THAT GO BUMP IN THE NIGHT… PART 2
Cybersecurity

THINGS THAT GO BUMP IN THE NIGHT…PART 2

Was that scratching noise a mouse in the server room? Or, some nefarious creature stalking your organization’s valuable data? Sometimes the things that we think are mortal threats can be easily mitigated, yet every day processes can be a source of unexpected danger. In our second piece on “Things that

Read More »
Cybersecurity

THINGS THAT GO BUMP IN THE NIGHT…PART 1

In cybersecurity, not all “monsters” are as scary as they may first seem. Others are far scarier than you ever thought. View this infographic, the first in a series of four, to meet our first “monster” – ransomware – and find out if you should be fearing for your organization’s

Read More »
Does Open Source Leave You Open to Cyberattacks?
Cybersecurity

Does Open Source Leave You Open to Cyberattacks?

Usage of open source software (OSS) libraries and components is just about ubiquitous these days. Even organizations with policies prohibiting the use of open source code will find that someone, somewhere is running an application that takes advantage of components and dependencies that were created or modified by an open

Read More »
Maximizing the Value of Your Cyber Insurance Policy
Cybersecurity

Maximizing the Value of Your Cyber Insurance Policy

As growing numbers of organizations digitize aspects of their operations or embrace digital business models, cyber risk is assuming life-or-death proportions for more and more companies. While business leaders have long been accustomed to managing risks amidst uncertain conditions, those posed by cybercrime have dramatically increased in severity over the

Read More »
How to Manage Insider Risk
Cybersecurity

How to Manage Insider Risk

One of the most common questions we get from our clients is how much they should worry about the cybersecurity risks posed by their organization’s own employees. They often want to know whether their biggest risks are internal or external. Quite often, they’re surprised by the answer. According to the Verizon

Read More »
Top 4 Work-from-Anywhere Cybersecurity Tips
Cybersecurity

Top 4 Work-from-Anywhere Cybersecurity Tips

By now, we’re all familiar with the fact that the world of work has undergone dramatic change over the past two years. The abrupt office closures and large-scale shift to remote work that took place in 2020 were followed by a period of re-evaluation and self-scrutiny. According to the Microsoft 2022

Read More »