Why Operational Technology may be your Cybersecurity Achilles’ Heel

Why Operational Technology may be your Cybersecurity Achilles’ Heel

Everyone in business is familiar with information technology (IT) and understands what it means, but what about operational technology, often abbreviated “OT”? At first glance, IT and OT appear similar because they share similar technologies like IP networks and Windows operating systems – but they have very different objectives. While IT systems generally support office workers and...

Read More
Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

This week brought another set of headlines about a large data breach—this time at Capital One. In this case, the alleged attacker is domestic and the federal indictment provided some details of how the breach occurred. In this case, a misconfigured firewall allegedly allowed Paige Thompson to remotely execute commands against an Amazon Web Services (AWS) server.…

Read More
7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

Despite the escalated rate and severity of cyberattacks, leaders at most companies have not changed their approach to cybersecurity in the past few years to adapt to the increasingly challenging environment. The goalposts have changed. And the question leaders should ask themselves is not, “is my data secure?” but “how prepared are we to minimize operational downtime in the likely event of a...

Read More
How to Rethink your Cybersecurity Strategy in 5 Minutes

How to Rethink your Cybersecurity Strategy in 5 Minutes

Malware attacks are wreaking havoc on the international economy and costing businesses billions of dollars in lost revenue, operational shutdowns, and reputational damage. It’s likely that you may have even experienced an episode like this at your firm. The latest industry research indicates that 50% of surveyed executives experienced disruptions from malware 6-10 times over the past five...

Read More
A Weekend Reminder of Why Resiliency, Not Data Protection Matters

A Weekend Reminder of Why Resiliency, Not Data Protection Matters

This past weekend was a reminder of why companies need to focus more of their efforts on protecting the resiliency of their environments – even if those investments come at the expense of data protection. On both Saturday and Sunday, news reports and Twitter posts were trending with photos of Target stores full of customers standing in line because the point of sale systems were unable to...

Read More
Tackling the Cybersecurity Skills Shortage at the CyberForce Competition™

Tackling the Cybersecurity Skills Shortage at the CyberForce Competition™

Teaming Up with the Department of Energy and Argonne National Laboratory at the CyberForce Competition™ The US Department of Energy (DOE) hosted their CyberForce Competition™   in late 2018 within their network of National Laboratories across the United States. The competition was created with the goal of addressing the cybersecurity skill gap in the marketplace today.…

Read More
Data Security in a Quantum World

Data Security in a Quantum World

In a 2018 study by the Ponemon Institute, the global average cost of losing one record to a data breach was estimated to be $148. For the United States, this cost rose to $233, giving it the highest average total cost at $7.91 million per incident. With the world experiencing a Cambrian Explosion of data growth, forecasted at 42% through 2020, minimizing the impact of malware is essential.…

Read More
Just Released: HHS and Healthcare Industry Cybersecurity Best Practices

Just Released: HHS and Healthcare Industry Cybersecurity Best Practices

In 2015, HHS (Health and Human Services) convened the Cybersecurity Act of 2015 405(d) Task Group leveraging the HPH (Healthcare and Public Health) Sector Critical Infrastructure Security and Resilience Public-Private Partnership.  The Task Group is comprised of over 150 members representing many roles and organizations in from healthcare practitioners, privacy, and cybersecurity subject...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons