Developing an Action Plan for Cyber-Physical Systems
Developing an action plan for cyber-physical systems is an integral part of a complete risk management program that continues to grow in importance. According to Gartner, “By 2023, 75% of organizations...
View ArticleHow to Allocate Resources
What is Resource Allocation Resource allocation, in the scope of risk management, is the process of how an organization distributes its resources across the company for specific uses. This includes...
View ArticleEconomic Recession Risk Management
It is our collective job as members of an organization to work towards mitigating and managing risks wherever we can, and this includes external risks that are often out of our control. In the case of...
View ArticleColonial Pipeline Ransomware Attack
In May of 2021, the United States experienced what many are referring to as the largest cyberattack to ever take place on an American energy system. The cyberattack left a major US oil pipeline offline...
View ArticleMcDonalds Data Breach and Cybersecurity
McDonald’s has just recently suffered a data breach, proving once again that gaps in security can exist for companies of any size. This incident is a great reminder to reassess your company’s...
View ArticleOutsourcing Risk Management
Outsourcing is a business practice of hiring a third party to perform services or create goods that otherwise could be performed in-house by the company’s existing staff. This applies to a wide range...
View ArticleIncreased Regulations for Financial Institutions
On June 30th, 2021, the U.S. Department of the Treasury released a set of national priorities in a document titled ‘Anti-Money Laundering and Countering the Financing of Terrorism National...
View ArticleFinancial Risks That Could Be Present in Your Supply Chain
One of the most difficult parts of running a business includes the dependency you have on other people. You depend on your employees to pull their weight and you depend on other companies to help you...
View ArticleThe Importance of Risk Monitoring
Risk Monitoring Overview Risk monitoring is a crucial step in the total risk management process. Unfortunately, there is never a true end to the risk management process; risk monitoring will always be...
View ArticleRisk Management Software
What is Risk Management Software? Risk management software is a necessary tool that aids companies in preventing or managing a variety of risks. These risks include, but are not limited to, financial...
View ArticleWhat is GRC?
GRC Defined GRC is an acronym for governance, risk, and compliance; it’s a term that refers to an organization’s strategy and management for each of those three components. GRC is a structured approach...
View ArticleWhat is GDPR?
GDPR Defined The General Data Protection Regulation (GDPR) is a data privacy and security law that was passed by the European Union back in 2018. It quickly made its reputation as one of the toughest...
View ArticleCalifornia Oil Spill
Late last week on Friday, October 1st, a major oil spill occurred off the coast of Southern California. An estimated 126,000 gallons of oil had spread across 13 square miles of the Pacific Ocean,...
View ArticleRiskWatch Product Breakdown
RiskWatch Introduction Thank you for taking the time to read about RiskWatch! Every so often, for the sake of clarity, we like to post a recap of who we are and the products we offer. Since 1993 we’ve...
View ArticleAwareness of Third-party Risks
Third-party risk is quickly becoming a primary concern for many organizations as the utilization of outside resources continues to increase. These organizations are operating in a complex ecosystem...
View ArticleNetwork Breach Awareness
A network breach, also referred to as network intrusion, refers to a cyberattack or unauthorized activity on your organization’s digital network. This breach typically jeopardizes network security and...
View ArticleSpear Phishing
What is Spear Phishing? Spear phishing is a means of electronic communication, most commonly via email, that is targeted to a specific individual or business in an attempt to steal private information...
View ArticleFileless Malware Risk
What is Fileless Malware? Fileless malware is a type of malicious software that utilizes legitimate programs, rather than virus-laden files, to infect a host. These legitimate programs are used to...
View ArticleMan-in-the-Middle Attack
What is a Man-in-the Middle Attack? A man-in-the-middle (MITM) attack is a type of cyberattack in which a cybercriminal secretly intercepts communication between two parties, therefore being “in the...
View ArticleDenial of Service Attacks
What are Denial of Service Attacks? Denial of Service (DoS) Attacks are meant to shut down a network, making it inaccessible to intended users. Often, systems are shut down due to malicious traffic...
View Article
More Pages to Explore .....