Data Security in a Quantum World

Data Security in a Quantum World

In a 2018 study by the Ponemon Institute, the global average cost of losing one record to a data breach was estimated to be $148. For the United States, this cost rose to $233, giving it the highest average total cost at $7.91 million per incident. With the world experiencing a Cambrian Explosion of data growth, forecasted at 42% through 2020, minimizing the impact of malware is essential.…

Read More
Just Released: HHS and Healthcare Industry Cybersecurity Best Practices

Just Released: HHS and Healthcare Industry Cybersecurity Best Practices

In 2015, HHS (Health and Human Services) convened the Cybersecurity Act of 2015 405(d) Task Group leveraging the HPH (Healthcare and Public Health) Sector Critical Infrastructure Security and Resilience Public-Private Partnership.  The Task Group is comprised of over 150 members representing many roles and organizations in from healthcare practitioners, privacy, and cybersecurity subject...

Read More
Cybersecurity Diligence in Private Equity Transactions: A Q&A with Experts Who Have Completed Hundreds of Deals

Cybersecurity Diligence in Private Equity Transactions: A Q&A with Experts Who Have Completed Hundreds of Deals

Cybersecurity. It’s something that you need to be aware of both when you’re looking to acquire and once you’ve acquired in the continued day-to-day operations of the company. You don’t want to risk your data being exposed, being embarrassed, or suffering financial loss. Alex Agran, host of the Private Equity Technology Podcast, recently interviewed two West Monroe...

Read More
Why should electric utilities take a closer look at supply chain risk management?

Why should electric utilities take a closer look at supply chain risk management?

Three years ago, I managed the vendor evaluation process for a utility assessing wireless options for telecom connectivity to substations. The field was limited to two vendors and cybersecurity was an important topic we wanted to explore in more detail with each. One specific area we sought to understand was the process used to address any cybersecurity issues that might arise with the...

Read More
Is My Organization in Scope for GDPR?

Is My Organization in Scope for GDPR?

Starting May 25th, the EU’s General Data Protection Regulation (GDPR) is taking effect. Despite the looming start date, there are many organizations that are still unclear about the language of the regulation and why organizations in the US should be aware. A good starting point for understanding how GDPR may affect your organization is to determine if GDPR even applies, and if so, what is...

Read More
Don’t Take the Bait: Phishing Attacks

Don’t Take the Bait: Phishing Attacks

Phishing is one of the most pervasive security threats today and it’s only getting worse Over the last few years, phishing attacks have continued to rise as attackers refine strategies, execute successful programs, and make money. Attackers are taking advantage of end users to steal credentials or get them to click on malicious links.…

Read More
Pre-emptive Cybersecurity: Spend a Little Now or Pay a Lot Later

Pre-emptive Cybersecurity: Spend a Little Now or Pay a Lot Later

Several news outlets are reporting recently that over the past month, the City of Atlanta has been struggling with a ransomware attack – specifically, an attack by SamSam ransomware, which encrypts data and holds decryption keys for a cryptocurrency ransom. The City of Atlanta opted not to pay the roughly $50,000 ransom and instead is expected to spend more than $2.5 million on recovery...

Read More
Move Aside Cloud, Blockchain is the Newest ERP Trend

Move Aside Cloud, Blockchain is the Newest ERP Trend

On January 10, 2018, Geoprise Technologies Corporation, the maker of GM-X ERP, announced that it has partnered with Coin Sciences Ltd, maker of the MultiChain blockchain platform, to launch an ERP application leveraging blockchain technology to enable secure business-to-business collaboration and others are quickly following suit. Let’s take a step back to understand what blockchain is and...

Read More
How to Mitigate Spectre/Meltdown Vulnerabilities

How to Mitigate Spectre/Meltdown Vulnerabilities

Organizations must consider their strategy for deploying Windows Updates to mitigate the Meltdown and Spectre Spectre/Meltdown vulnerabilities. This blog is specifically related to a new gotcha clients may need to address in order to successfully deploy the Microsoft hotfixes that help mitigate these vulnerabilities. It’s important to call out a key behavioral change in the way Microsoft is...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons