Bite Size Security Blog
Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.
Get informed and stay safe with NCX Group.
Bite Size Security Blog
Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.
Get informed and stay safe with NCX Group.
Latest Updates
5 important business aspects that holistic security protects
When an executive doesn’t breathe security day to day like the CISO and CIO, their idea of security is a lot like onboarding a new software for team collaboration that they don’t use much. They know the software helps operations, but they are unclear of its full potential.
Overcoming common employee security challenges
A recent study reveals some of the security headaches that business executives face with employees and risk management practices. The study shows why employees can be one of the main reasons…
Security goes beyond the CEO and CIO
Businesses don’t always realize just how vulnerable they are to risks. This lack of insight isn’t from lack of trying, it’s simply that when you’re not in the industry of cybersecurity it’s only normal to have limited knowledge on it.
Steps to secure your data following the Equifax breach
If you’re worried about your credit card information following the Equifax breach, follow these 6 steps to regain control of the situation.
Most common CEO cybersecurity question: What do I have that anybody wants?
When study after study shows a consistent challenge for businesses to onboard cybersecurity holistically, you have to wonder why that is. The reasons vary from lack of expert IT security professionals to go around, to thinking quick fix security solutions can work or be enough to defend against intrusion.
The state of cybersecurity continues to stall making businesses vulnerable
As the last quarter of the year approaches there are various changes businesses are facing when it comes to cybersecurity…
SMBs are unprepared to defend against cyberattack and ransomware
A recent survey by Malwarebytes shares great insight into the vulnerability of small and medium businesses (SMBs) to cyberattack…
Major IoT security challenges that require immediate attention
While organizations onboard IoT devices to improve business operations and processes, it seems that few organizational boards require IoT risk assurances from third parties.
Data breach costs are scary but there’s something you can do about it
Understanding the costs your organization can face when it comes to data breach can help you realize how breaches impact your bottom line, as well as why information security is essential if you’re going to keep those costs down.
The hidden lessons from NotPetya ransomware that nobody’s talking about
Exploring the hidden lessons from NotPetya ransomware that nobody’s talking about and that can help executives prepare for future attacks.
Study shows the costs of IoT security breach are not cheap
Do you know how much an IoT breach costs your business? Let’s start with the fact that it’s not cheap…
Solving the medical device security challenge
When it comes to securing devices, businesses are facing quite the challenge. 90% of IT security pros find that connected devices will be a major security issue this year and for medical devices, the picture is looking even harder.
Why business continuity plans are key to ransomware attacks like WannaCry
The monetary consequence a ransomware attack like WannaCry has on an organization is clear; but what about the business disruption damages?
Artificial intellgince’s role in cybersecurity for SMBs and healthcare
With the adoption of new technology for conducting work in the digital world, it is only normal for new technology to start coming out as possible solutions to cyber threats. One such area that has been in the spotlight lately is artificial intelligence (AI) and how...
Large Scale Cyber Attack (WCry2 Ransomware Outbreak)
Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate. Ransom: between $300 to $600. There is code to 'rm' (delete) files in the...
Identify your cybersecurity risks and defend your business with MyCSO
The wait and watch approach isn’t an option for businesses who want to protect data from risks. MyCSO services cover all cybersecurity needs…
The state of online security isn’t looking too good yet
Exploring two cybersecurity studies that reveal businesses still have a lot of work to do in information security if they’re going to protect their business…
The challenges businesses are facing with BYOD and mobile security
Research reveals that even though businesses have mobile workers, they aren’t where they need to be with their mobile security strategy.
How to Make Sure Your Applications are Secure
Application security requires its fair share of attention if a business wants to minimize its vulnerabilities when using apps.
Why staying on track with IoT security needs to be a priority
IoT security is something that has been talked about for some time and as devices continue to grow, so do the threats that come along with them. When we take a look at what some of the IT security professionals have to say about connected devices, a Pwnie Express research shows that…
Don't Be Shy.. Get In Touch.
If you are interested in working together, send us an inquiry and we will get back to you!