Web Application Vulnerability Leads to Compromised Data

by Sarah Harvey / December 16, 2022

Georgia Tech Data Breach Last week, Georgia Tech announced a vulnerability in a web application that compromised 1.3 million individuals’ information, spanning from current students to alumni to employees. The vulnerability allowed unauthorized, third party access to a central Georgia Tech database. The university hasn’t released many details yet, but we do know the basics of the incident. The Georgia Tech data breach was found in late March but the…

Top Cybersecurity Challenges for the Hospitality Industry

by Sarah Harvey / June 14, 2023

The hospitality industry needs personal data to be successful – but that comes with a price. If you’re collecting or processing personal data, you’re responsible for securing it. The hospitality industry relies on the feeling of being secure, in every aspect of guests’ visits. Organizations within the hospitality must consider why they’re a target for cybersecurity attacks, which data privacy and security frameworks and regulations apply to them, and what…

Cyber NYC Initiative: Will NYC Become the Next Cybersecurity Hub?

by Sarah Harvey / June 14, 2023

New York City is known for its state-of-the-art architecture, fast-paced lifestyle, variety of cultures, and endless supply of street food, but it’s about to be known for an initiative that some might believe to be long overdue: Cyber NYC. As cybersecurity threats continue to impact businesses and cities of all sizes, local governments, like that of New York City’s, have taken it upon themselves to ensure the security of their…

Internal Accountability: Monitoring Compliance

by Sarah Harvey / February 20, 2023

Ensuring that your organization is up-to-date on compliance requirements can be an overwhelming task, and many organizations don’t know where to begin. While many resources are about becoming compliant, they don’t explain why internal accountability is important or give you actionable steps to maintain compliance. In this webinar, our Director of Regulatory Compliance, Mark Hinely, discusses the next steps your organization can take after you’ve identified your compliance requirements and…

Is Endpoint Protection a Comprehensive Security Solution?

by Sarah Harvey / December 16, 2022

Does your organization have a bring-your-own-device policy? Do your employees use external storage devices? How do you protect workstations, servers, and mobile devices that connect to your network? The perimeter of businesses today only keep expanding – and so does the use of endpoint protection. Is endpoint protection the best way to protect your network, though? The Rise of Endpoint Protection With the number of endpoints with the ability to…