by ITNS Consulting | | Best Practices, Culture, Cyber Security, Incident Response, Tips
A security incident can topple an organization’s reputation and revenue in a short amount of time. As billionaire Warren Buffet once said, “it takes 20 years to develop a reputation and five minutes to ruin it.” Keeping that in mind, it’s ideal to...
by ITNS Consulting | | Best Practices, Business, Cyber Security, Risk Management, Security Training, Tips
While organizations and workers have certainly benefited from the advancement of technology, it has also introduced an unprecedented number of cybersecurity risks. Ransomware attacks, for example, hit businesses every 11 seconds in 2021.1 Therefore, what every...
by ITNS Consulting | | Best Practices, Tips
In IT, the principle of least privilege (PoLP) refers to the concept that any process, program or user must be provided with only the bare minimum privileges (access or permissions) needed to perform a function. For instance, if a user account has been created for...
by ITNS Consulting | | Cyber Security, Risk Management, Tips
No business today is 100% secure from cyber threats and more businesses are waking up to this reality now more than ever before. It’s no wonder cybersecurity investment in 2020 is pegged to grow by 5.6% to reach nearly $43.1 billion in value.1 With cyber attacks...
by ITNS Consulting | | Cyber Security, News, Tips
This article was written by Ryan Heidorn, Co-Founder and Managing Partner at Steel Root. The article originally appeared in CISOMAG on November 20, 2020. ITNS Consulting has been allowed to re-post this content in its entirety with Ryan’s expressed permission. As if...
by ITNS Consulting | | Cyber Security, Tips, Vulnerabilities
Every now and then, an email with a catchy subject line appears in your inbox and you end up clicking on it, either because you’re curious about the subject line or because you assume the sender is trustworthy. Unfortunately, this is how most cyber attacks tend to...