Profile cover photo
Profile photo
CBI
21 followers -
IT Risk Management, Professional Services
IT Risk Management, Professional Services

21 followers
About
Posts

Post has attachment
CBI's J.Wolfgang Goerlich comments on the recent attacks on Apple's development tools in CSO Online article.

"Few organizations are considering Macs [from a security perspective] as the numbers have long been small and most [security] controls are Windows-based,”

http://bit.ly/1iO0LJU #infosec #misec
Add a comment...

Post has attachment
New blog post!

IT Maturity: The First Ten Steps to a Secure Future http://bit.ly/1EvJ7ov #infosec
Add a comment...

Post has attachment
"When the data is the target, you need a data-focused solution. Data Loss Prevention (DLP) working in concert with other technologies, provides that platform."

http://bit.ly/1D6HZqs #infosec #dlp #datalossprevention
Add a comment...

Post has attachment
DLP 2.0 for Business Enablement | The resources on this page offer insight into how our how our strategists are tackling poor DLP implementations and turning them into effective solutions. http://bit.ly/1GVzeug
Add a comment...

Post has attachment
"Organizations that do it right have communication tools, managerial support, committees, and department leads that are involved in understanding the risks."

New blog post by our CEO, Steve Barone

http://bit.ly/1AxKNvo #infosec #culture
Add a comment...

Post has attachment
New Blog Post by CBI's EVP | Business Development, Dave Glenn!

"CBI is committed to developing and delivering innovative IT advisory services, network security, and IT risk management strategies. “Creative” is in our name and our DNA as a company, so it’s only natural we continually improve on strategies to respond to the rapidly evolving tactics of today’s cybercriminals, who are constantly developing new and sophisticated ways to attack our customers."

http://bit.ly/1cRSdi5 #infosec #ISTR
Add a comment...

Post has attachment
New blog post by CBI's Security Strategist, J.Wolfgang Goerlich!

"The Starbucks security hole is simple enough. The criminal breaks into the coffee-loving victim’s account by guessing their password or using the password reset features. They then load a Starbucks gift card using the victim’s stored payment information, and transfer that card to themselves. This is usually automated so that several gift cards can be filled and stolen in a short period of time. The attack normally ends only when the victim receives notices on the gift cards and resets their Starbucks password."

How Hackers Get Free Coffee with Your Money http://bit.ly/1e5D5yF #infosec
Add a comment...

Post has attachment
New blog post by our EVP | IT & Security Strategy, John Beeskow!

"In 2014, there was a 4000% increase in crypto-ransomware attacks affecting 45 times more people than the previous year."

http://bit.ly/1KAo2XK #infosec #ISTR
Add a comment...

Post has attachment
New blog post is live!

"Although most IT departments are packed with highly skilled team members, the reality is very few of them have done a full-fledged data migration. Often times, organizations take on more than they are capable of and seek an experienced vendor to lead, assist, or even fully perform the migration project."

http://bit.ly/1DUMr8K #infosec #data #migration
Add a comment...

Post has attachment
Check out John Beeskow, EVP | IT & Security Strategy, as he chats with our partner Symantec from the RSA Conference this week!

http://bit.ly/1EjXJov
Add a comment...
Wait while more posts are being loaded