We offer decades of experience in technology solutions, combined with in-depth knowledge of the latest industry advances.
Article
The effects of COVID-19 on society and global business have been both vast and abrupt. Many are entrenched in the ongoing struggle of operational shifts. According to Dr. Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases, it...
Article
October of last year I led a business continuity (BC) workshop for clients, prospects and partners. While explaining that a good BC program permeates throughout an entire organization an attendee asked how he could best deliver that message to upper...
Article
You have probably heard of this interesting virus affecting people in other countries. However, have you considered the organizational impact Coronavirus may already have on your business today? What about when, not if, it proliferates in the United States? All...
Article
An article caught my eye this week. It involves the unfortunate circumstances in the city of Baltimore, but it’s a valuable lesson to any organization (link below). In short, a combination of ransomware and poorly managed backups wreaked havoc on...
Article
Business Continuity and Top Management are Inseparable ContinuityCentral.com posted an analysis by editor David Honour of a crisis communication statement made by National Grid CEO John Pettigrew following a wide-area power outage that occurred on August 9th, which was the largest to occur...
Article
With the release of the criminal complaint in the recent Capital one breach we now have a better understanding of how Paige A. Thompson exfiltrated data from their cloud vendor. We don’t know all the details and can only make inferences based...
Article
Six of the URGENT/11 bugs can be exploited to achieve remote code execution (RCE). At least one bug affects each version of the OS starting with 6.5, while others can lead to a denial of service (DoS) attack. Well, while this...
Article
Any time a human is involved, the potential for weakened security increases. Password policies are necessary for cybersecurity compliance; however, burdensome password policies can result in bad user behavior like password transformation. SUBSCRIBE TO SAYERS BLOG REMEMBER WHEN - IBM published...
Article
Sometimes we just need a sanity check and assessments offer that opportunity. An assessment can offer a glimpse into those things that may require our attention, and ideally, some validation of our good work. But, they can be potentially expensive. ...
Article
The attraction of a DevOps strategy is understandable, but sometimes I feel like the speed of business should be just a bit slower. At least slow enough so we security professionals can properly get on-board. The most recent indicator of...