Cyber Security

Home/Cyber Security

OPI Technology Update: March of the Machines, An Interview with Dr. Hend Ezzeddine

By |2017-11-17T09:48:26-07:00July 19th, 2017|Cyber Security|

“While we’re seeing the number of attacks trending higher, we are also experiencing more rigorous reporting of cyber breaches and the uncovering of attacks that happened several years ago” says Dr. Hend Ezzeddine, PhD, Cyber Security Practice Director at Expressworks International. While the number of companies adopting the latest [...]

In Cybersecurity, Language Is a Source of Misunderstandings

By |2017-03-05T20:07:20-07:00February 28th, 2017|@enable_change, Cyber Security|

To successfully fight threats across industries, we must all use the same terminology.Read the full article at: "We must continue to strive toward establishing a common global cybersecurity language that spans government, industry, and academia: this is our center of gravity. Until we make progress, this is a deficiency that will remain a vulnerability that our common adversaries exploit to outpace and outmaneuver us. " People are an often overlooked line of defense in any cyber security strategy. If users aren't clear about what they're supposed to do or don't understand what you are trying to tell them, even the best technology will not help. Human behavior, being what it is, is greatly helped by using simple and unambiguous language. So a word to the wise, if you're a cyber security expert, make your language plain and free of jargon if you're trying to enlist people in your fight against cyber crime. Contact us if you need help with human behavior in your cyber security programs.

The 7 Most Sensational Breaches Of 2016

By |2017-03-05T20:07:22-07:00January 31st, 2017|@enable_change, Cyber Security, IT Strategy & Implementation|

The biggest hacks, data exposures, and thefts that left companies and government entities reeling.Read the full article at: A list of security breaches? Why not? People like lists. It happens every year, at the end or the beginning. Some are lists of things to do for the next year. Some are lists about the previous year -- like the 2016 best or worst songs, novels or movies. There’s a list of the world’s richest people, the most expensive universities, the cheapest cars and even a list of the largest government technology contracts. Bucket lists, most wanted lists, wish lists, Santa lists. And the list goes on. So, here is a list of the most sensational security breaches for 2016. From emails to bank accounts. From the IRS to Yahoo. From Illinois and Arizona Boards of Election to the San Francisco Municipal Transportation Agency. Data exposed, money stolen, CEO’s fired, people harmed, and, possibly, presidential elections lost. Breaches happen all over the world to all types of businesses, agencies and individuals. No one is immune. Nothing is off limits. We must be diligent and make it our responsibility to actively safeguard our personal and business data. The weakest link in a cyber security network might be the human one. Contact us and we can help you understand the risks and help you make cyber security choices that are the right ones for you and your business.

Are Users Careless or Simply Human?

By |2017-05-23T10:53:08-06:00October 18th, 2016|Cyber Security, IT Strategy & Implementation, Organizational Change Capacity|

The concept of “psychology of security” is often a foreign concept to  IT professionals, yet they all acknowledge that users are the biggest challenge. When hackers are unsuccessful at exploiting technical vulnerabilities, they turn their attention towards users. They scan for responses to psychological triggers and cognitive patterns that can [...]

Go to Top