888-448-5451 [email protected]

Bite Size Security Blog

Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.

Get informed and stay safe with NCX Group.

Bite Size Security Blog

Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.

Get informed and stay safe with NCX Group.

 

Latest Updates

Watchdog Report: Infosec Trends with FBI Agent Geoff Bickers (Part 2)

In part two of this infosec interview with FBI agent Geoff Bickers, he and Mike discuss Cyber Crime, Hackers, Intrusions, Malware, Spyware, Botnets and Emerging Trends in InfoSec.
At the end of this interview you will gain insight into many of the threats businesses face everyday and the steps you can take to mitigate your risk.

read more
Falling for InfoSec Jedi Mind Tricks?

Falling for InfoSec Jedi Mind Tricks?

The real trick in the information security industry is discerning fact from fiction. Eliminating false positives is the most efficient way to focus on the real issues and threats within the system. Falsepositives must  be eliminated in order to truly protect your...

read more

The Best of the Watchdog Report ~ InfoSec Podcast Series

NCX Group now has its own channel on Blog Talk Radio. We are currently sharing the best of The Watchdog Report series covering topics like InfoSec and more. You can follow the channel here.    In our first installment of the The Best of The Watchdog report, NCX Group...

read more
How Katrina Changed Business Continuity Planning

How Katrina Changed Business Continuity Planning

It's been seven years since Hurricane Katrina changed the lives of Gulf Coast residents on August 29, 2005. The aftermath of Katrina left thousands homeless. But, it also created chaos among businesses located in the areas affected by the storm. Now, here we are,...

read more
The Non Sexy Sister ~ Business Continuity

The Non Sexy Sister ~ Business Continuity

Although network security and information security are the new sexy terms in information technology, they are not the only terms to consider. Business continuity may be the non-sexy sister, but without a business continuity plan, a business may be only one disaster away from ruin.

read more
The CSO ~ Dissected

The CSO ~ Dissected

The role of the Chief Security Officer, or CSO, has evolved as information security has reached a higher state of concern over digital threats, such as systems hacking, viruses, and coordinated security assaults on network infrastructures. Information is the primary...

read more
Who is on Medical Data Security Detail?

Who is on Medical Data Security Detail?

  Since the introduction of the HITECH Act in 2009, the business of protecting patient data has reached a level of critical importance. With severe civil and criminal consequences, HIPAA now has the teeth to punish those who do not protect patient data. Coupled...

read more

Medical Identity Theft ~ A billion dollar crime

Medical identity theft occurs when a patient's personal medical information is stolen and used by a thief to fraudulently receive health care services. Medical identity thieves can use patient information to have surgeries, get medical treatments, pay for...

read more
What is the ROI of Data Security?

What is the ROI of Data Security?

Part of any business model includes the expectation that if money is invested, a return on the investment can be measured by how it impacts your bottom-line. However, understanding the value of investing those dollars in data security and calculating ROI can be...

read more
20,000 events per second

20,000 events per second

With the rise of the Internet, information has never before been so readily accessible both to authorized, and unauthorized individuals. Data security has become a prime concern. Gone are the days when security simply involved the guard who would patrol the corridors....

read more

Cybersecurity Bill Seeks New Regulation

FEBRUARY 15, 2012 A bill introduced by leading U.S. senators yesterday requires the owners and operators of our nation's critical computer networks to safeguard against hackers. Essentially, under this bill, the Department of Homeland Security would have the power to...

read more
New CA Breach Notification Law In Effect

New CA Breach Notification Law In Effect

FEBRUARY 8, 2012 As a reminder, any business or entity that conducts business within California and collects and holds Personally Identifiable Information (PII) is now subject to Senate Bill 24, which amends the California breach notification law. This new bill aims...

read more
Defend Your Data – 2012 to Challenge Profits

Defend Your Data – 2012 to Challenge Profits

NCX SECURITY INSIGHTS / JANUARY 2012 - #2 As CEO of NCX Group, I wish you and your company a prosperous new year. It is sure to be a challenging one for all of us due to the economy and smaller budgets, and with the 2012 data threat predictions calling for an increase...

read more

How to Avoid a Security Breach

NCX SECURITY INSIGHTS / JANUARY 2012 - #1 It would be the ultimate buzzkill to learn that data breaches you hear happening to other companies has now happened to yours, especially when your company’s security measures were strong, or so you thought. There’s a...

read more

Calif. Amends Data Breach Notification Law

California Amends Data Breach Notification Law California has one of the toughest breach notification laws in the country.  Although it is strong on notification, the current law lacks direction on what information to include when issuing a data breach notification. ...

read more

Are CIOs Making Isolated Decisions?

Are CIOs Making Isolated Decisions? Results of a recent survey by Financial Executives International (FEI) and Gartner posted on CIO states CIOs and IT teams are falling short of CFO expectations. CFOs, who appear to be having a greater influence over IT, don’t have...

read more

Can You Trust Your Security to the Cloud

Can You Trust Your Security to the Cloud – At Least Not Yet Companies that have launched their data into the cloud might be doing so at a greater cost than what they hope to save. The lure of IT cost savings provided by cloud computing becomes a strong incentive in...

read more

Don't Be Shy.. Get In Touch.

If you are interested in working together, send us an inquiry and we will get back to you!