by ITNS Consulting | | Cyber Security, Data Breach, Ransomware, Risk Management
While there is an over-arching belief that data isn’t really “stolen” in a ransomware breach, no organization hit with ransomware has been able to back this up as fact. That’s why compliance regulations mandate businesses to notify their clients if their data is in...
by ITNS Consulting | | Best Practices, Cyber Security, Data Breach, Internet of Things (IoT), Risk Management
The continued rise in the number of Internet of Things (IoT) connected devices has brought about a host of security challenges for many businesses. As manufacturers compete in a race to bring their IoT devices to market, most fail to include even the most basic...
by ITNS Consulting | | Best Practices, Business, Cyber Security, Data Breach, Risk Management
Humans generate 2.5 quintillion bytes of data every day.1 That is a substantial amount of information. However, failing to keep up with the ever-changing threat landscape might wipe your share of this data in the blink of an eye. In fact, ransomware has more than...
by ITNS Consulting | | Business, Cyber Security, Data Breach, Risk Management
The COVID-19 pandemic has impacted everyone in one way or another. If there is one category that most benefited from the pandemic, it’s cyber criminals. That’s why cyber crime has shot up by almost 300% since the start of the pandemic1 and that’s why you must adopt...
by ITNS Consulting | | Cyber Security, Data Breach, Phishing, Vulnerabilities
Critical Infrastructure (CI) comprises physical and cyber assets vital for the smooth functioning of societies and nations across the globe. The sectors that make up critical infrastructure differ from one country to another. For example, the USA considers 16 sectors...
by ITNS Consulting | | Cyber Security, Data Breach, Internet of Things (IoT), Risk Management, Vulnerabilities
The COVID-19 pandemic impacted individuals and businesses all over the world in one way or another. Almost overnight, it disrupted the way people went about their daily routines and how companies operated. Amidst all the chaos, changes to the cyber landscape with...