Cybersecurity

Insights

Cybersecurity: The New Battlefield

Cybersecurity: The New Battlefield

War is no longer fought only on a battlefield. It happens everywhere at any moment in the devices we carry around in our back pockets and on our wrists. Cybersecurity was unheard of until 50 years ago—years before personal computers became commonplace. Now, with...

Why Complacency Is Leaving the U.S. Electrical Grid at Risk

Why Complacency Is Leaving the U.S. Electrical Grid at Risk

On a list of the critical necessities for our country’s modern way of life, at the very top has to be electricity. Not only does it provide light, keep our food from spoiling and maintain a comfortable temperature in our living spaces, it powers the many screens with...

The Frontline is On Your Front Porch

The Frontline is On Your Front Porch

The battlefront of the digital world may be hidden, but it’s lurking right at our doorsteps. Cybersecurity affects each and every internet user – with more than 422 million individuals impacted by data compromises in the United States in 2022 alone. For the 16 sectors...

Cybersecurity 9/11 already happened. When will we act?

Cybersecurity 9/11 already happened. When will we act?

If you’re still waiting for a cybersecurity 9/11 or a ransomware Pearl Harbor to punch us in the gut, wake up. The equivalent has already happened. More than one, in fact. Maybe SolarWinds and Colonial Pipeline1 didn’t have the same devastating visuals of...

Your SOC Isn’t Enough. You Need A Mindset.

Your SOC Isn’t Enough. You Need A Mindset.

There were no SOCs when Sun Tzu wrote “The Art of War” more than 2,500 years ago. The ancient Chinese warrior’s old principles can empower new cybersecurity attitudes and approaches to fighting our newest wars in the digital realm. And make no...

It Isn’t About GCC High, It’s About Your Business

It Isn’t About GCC High, It’s About Your Business

CEOs need knowledge and confidence to make effective cybersecurity decisions, especially how IT will protect business outcomes CEOs incorporate tech to serve the business; not the other way around.  With everything from managed security services and GCC High to...

CMMC Frequently Asked Questions from DoD Contractors

CMMC Frequently Asked Questions from DoD Contractors

The Cybersecurity Maturity Model Certification (CMMC) is a framework being rolled out by the Department of Defense (DoD) in an effort to combat cyber attacks and breaches. Here, we answer common questions about it. The Who, What, and Why of CMMC Compliance 1. Who does...

National Cybersecurity Awareness Month

National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month, find out why this month is so important to us and why it should be important to you too as we share some tips and tricks on how to be #CyberSmart! October is a spooky month, and it can get even spookier if you’re not...

Cybersecurity in Response to COVID-19

Cybersecurity in Response to COVID-19

In response to the COVID-19 pandemic, millions of employees around the world are being forced to transition into remote work to achieve social distancing. As there is so much uncertainty regarding how long this will be in effect, it is important to ensure that...

The Risk of Insider Threats in Cybersecurity

The Risk of Insider Threats in Cybersecurity

The way we work has changed forever, with a large part of the workforce operating from remote endpoints and accessing an organization’s IT infrastructure from different geographical locations. Vendors and contractors external to an organization, often access its...

Cyber Security Risks are Business Risks

Cyber Security Risks are Business Risks

Modern life is dominated by technology. We interact with technology at nearly every point throughout our day, and we have become quite dependent on our online devices. We use devices for everything from communication to retail purchases, but most importantly, to make...

Who is Conquest Cyber?

Adaptive Cyber Risk Management Software