by ITNS Consulting | Assessments, Best Practices, Business, Culture, Cyber Security, Risk Management
The COVID-19 pandemic caused an unprecedented shift in the way people work. Although most companies relied on a fully remote work model initially, the vaccine rollout has led to the popularization of hybrid work environments. A hybrid work environment has elements of...
by ITNS Consulting | Cyber Security, Internet of Things (IoT), Phishing, Vulnerabilities
The current threat landscape is rapidly advancing, with cyber criminals constantly upgrading their toolset to break through security defenses. If you want to outsmart malicious hackers, it’s time to start to think like a hacker. Fend them off with various layered...
by ITNS Consulting | Cyber Security, Data Breach, Phishing, Vulnerabilities
Critical Infrastructure (CI) comprises physical and cyber assets vital for the smooth functioning of societies and nations across the globe. The sectors that make up critical infrastructure differ from one country to another. For example, the USA considers 16 sectors...
by ITNS Consulting | Cyber Security, Data Breach, Internet of Things (IoT), Risk Management, Vulnerabilities
The COVID-19 pandemic impacted individuals and businesses all over the world in one way or another. Almost overnight, it disrupted the way people went about their daily routines and how companies operated. Amidst all the chaos, changes to the cyber landscape with...
by ITNS Consulting | Best Practices, Cyber Security, Risk Management
Small and Medium Businesses (SMBs) usually invest less in cybersecurity, making them easier targets for cyber criminals. Close to 30% of businesses experience a cyber attack at least once per week.1 This only adds weight to the face SMBs must have a solid Cyber...
by ITNS Consulting | Business, Culture, Cyber Security, Security Training
Tools are only as good as their users. This should be your guiding philosophy as the world shifts to a hybrid work model to deal with the complexities posed by the COVID-19 pandemic. While it’s great to define and implement essential security controls and tools, if it...