Bite Size Security Blog
Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.
Get informed and stay safe with NCX Group.
Bite Size Security Blog
Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.
Get informed and stay safe with NCX Group.
Latest Updates
Watchdog Report: Infosec Trends with FBI Agent Geoff Bickers (Part 2)
In part two of this infosec interview with FBI agent Geoff Bickers, he and Mike discuss Cyber Crime, Hackers, Intrusions, Malware, Spyware, Botnets and Emerging Trends in InfoSec.
At the end of this interview you will gain insight into many of the threats businesses face everyday and the steps you can take to mitigate your risk.
Falling for InfoSec Jedi Mind Tricks?
The real trick in the information security industry is discerning fact from fiction. Eliminating false positives is the most efficient way to focus on the real issues and threats within the system. Falsepositives must be eliminated in order to truly protect your...
The Best of the Watchdog Report ~ InfoSec Podcast Series
NCX Group now has its own channel on Blog Talk Radio. We are currently sharing the best of The Watchdog Report series covering topics like InfoSec and more. You can follow the channel here. In our first installment of the The Best of The Watchdog report, NCX Group...
How Katrina Changed Business Continuity Planning
It's been seven years since Hurricane Katrina changed the lives of Gulf Coast residents on August 29, 2005. The aftermath of Katrina left thousands homeless. But, it also created chaos among businesses located in the areas affected by the storm. Now, here we are,...
Rioting In The Suites – InfoSec Impacts of a Presidential Election
Over the last 6 months CEO’s, Executive Boards, and Small Business Owners alike have been making Strategic Plans for a Romney Victory and for the Re-Election of President Obama. It has been said that elections have consequences, and if recent reports...
The Non Sexy Sister ~ Business Continuity
Although network security and information security are the new sexy terms in information technology, they are not the only terms to consider. Business continuity may be the non-sexy sister, but without a business continuity plan, a business may be only one disaster away from ruin.
The CSO ~ Dissected
The role of the Chief Security Officer, or CSO, has evolved as information security has reached a higher state of concern over digital threats, such as systems hacking, viruses, and coordinated security assaults on network infrastructures. Information is the primary...
Who is on Medical Data Security Detail?
Since the introduction of the HITECH Act in 2009, the business of protecting patient data has reached a level of critical importance. With severe civil and criminal consequences, HIPAA now has the teeth to punish those who do not protect patient data. Coupled...
Medical Identity Theft ~ A billion dollar crime
Medical identity theft occurs when a patient's personal medical information is stolen and used by a thief to fraudulently receive health care services. Medical identity thieves can use patient information to have surgeries, get medical treatments, pay for...
What is the ROI of Data Security?
Part of any business model includes the expectation that if money is invested, a return on the investment can be measured by how it impacts your bottom-line. However, understanding the value of investing those dollars in data security and calculating ROI can be...
NCX Group Inc Celebrates 10 Years Of Information Security
2012 marks the ten year anniversary of NCX Group Inc. In 2002, CEO and founder Michael Fitzpatrick saw up close the struggles of over 80% of the Fortune 500 companies in meeting both the Strategic and Tactical elements of information security. He wondered how...
GoDaddy Outage Provides Lessons in Business Continuity Preparation
Guest Post by NCX Group Contributor Anthony M. Freed In an increasingly outsourced marketplace, third-party service providers offer companies multiple benefits, including marked savings on hardware outlays and support personnel, scalability options and the utilization...
20,000 events per second
With the rise of the Internet, information has never before been so readily accessible both to authorized, and unauthorized individuals. Data security has become a prime concern. Gone are the days when security simply involved the guard who would patrol the corridors....
Cybersecurity Bill Seeks New Regulation
FEBRUARY 15, 2012 A bill introduced by leading U.S. senators yesterday requires the owners and operators of our nation's critical computer networks to safeguard against hackers. Essentially, under this bill, the Department of Homeland Security would have the power to...
New CA Breach Notification Law In Effect
FEBRUARY 8, 2012 As a reminder, any business or entity that conducts business within California and collects and holds Personally Identifiable Information (PII) is now subject to Senate Bill 24, which amends the California breach notification law. This new bill aims...
Defend Your Data – 2012 to Challenge Profits
NCX SECURITY INSIGHTS / JANUARY 2012 - #2 As CEO of NCX Group, I wish you and your company a prosperous new year. It is sure to be a challenging one for all of us due to the economy and smaller budgets, and with the 2012 data threat predictions calling for an increase...
How to Avoid a Security Breach
NCX SECURITY INSIGHTS / JANUARY 2012 - #1 It would be the ultimate buzzkill to learn that data breaches you hear happening to other companies has now happened to yours, especially when your company’s security measures were strong, or so you thought. There’s a...
Calif. Amends Data Breach Notification Law
California Amends Data Breach Notification Law California has one of the toughest breach notification laws in the country. Although it is strong on notification, the current law lacks direction on what information to include when issuing a data breach notification. ...
Are CIOs Making Isolated Decisions?
Are CIOs Making Isolated Decisions? Results of a recent survey by Financial Executives International (FEI) and Gartner posted on CIO states CIOs and IT teams are falling short of CFO expectations. CFOs, who appear to be having a greater influence over IT, don’t have...
Can You Trust Your Security to the Cloud
Can You Trust Your Security to the Cloud – At Least Not Yet Companies that have launched their data into the cloud might be doing so at a greater cost than what they hope to save. The lure of IT cost savings provided by cloud computing becomes a strong incentive in...
Don't Be Shy.. Get In Touch.
If you are interested in working together, send us an inquiry and we will get back to you!