Quantcast
Channel: RiskWatch
Browsing all 22 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Developing an Action Plan for Cyber-Physical Systems

Developing an action plan for cyber-physical systems is an integral part of a complete risk management program that continues to grow in importance. According to Gartner, “By 2023, 75% of organizations...

View Article



Image may be NSFW.
Clik here to view.

How to Allocate Resources

What is Resource Allocation Resource allocation, in the scope of risk management, is the process of how an organization distributes its resources across the company for specific uses. This includes...

View Article

Economic Recession Risk Management

It is our collective job as members of an organization to work towards mitigating and managing risks wherever we can, and this includes external risks that are often out of our control. In the case of...

View Article

Colonial Pipeline Ransomware Attack

In May of 2021, the United States experienced what many are referring to as the largest cyberattack to ever take place on an American energy system. The cyberattack left a major US oil pipeline offline...

View Article

McDonalds Data Breach and Cybersecurity

McDonald’s has just recently suffered a data breach, proving once again that gaps in security can exist for companies of any size. This incident is a great reminder to reassess your company’s...

View Article


Outsourcing Risk Management

Outsourcing is a business practice of hiring a third party to perform services or create goods that otherwise could be performed in-house by the company’s existing staff. This applies to a wide range...

View Article

Image may be NSFW.
Clik here to view.

Increased Regulations for Financial Institutions

On June 30th, 2021, the U.S. Department of the Treasury released a set of national priorities in a document titled ‘Anti-Money Laundering and Countering the Financing of Terrorism National...

View Article

Image may be NSFW.
Clik here to view.

Financial Risks That Could Be Present in Your Supply Chain

One of the most difficult parts of running a business includes the dependency you have on other people. You depend on your employees to pull their weight and you depend on other companies to help you...

View Article


Image may be NSFW.
Clik here to view.

The Importance of Risk Monitoring

Risk Monitoring Overview Risk monitoring is a crucial step in the total risk management process. Unfortunately, there is never a true end to the risk management process; risk monitoring will always be...

View Article


Image may be NSFW.
Clik here to view.

Risk Management Software

What is Risk Management Software? Risk management software is a necessary tool that aids companies in preventing or managing a variety of risks. These risks include, but are not limited to, financial...

View Article

Image may be NSFW.
Clik here to view.

What is GRC?

GRC Defined GRC is an acronym for governance, risk, and compliance; it’s a term that refers to an organization’s strategy and management for each of those three components. GRC is a structured approach...

View Article

What is GDPR?

GDPR Defined The General Data Protection Regulation (GDPR) is a data privacy and security law that was passed by the European Union back in 2018. It quickly made its reputation as one of the toughest...

View Article

California Oil Spill

Late last week on Friday, October 1st, a major oil spill occurred off the coast of Southern California. An estimated 126,000 gallons of oil had spread across 13 square miles of the Pacific Ocean,...

View Article


Image may be NSFW.
Clik here to view.

RiskWatch Product Breakdown

RiskWatch Introduction Thank you for taking the time to read about RiskWatch! Every so often, for the sake of clarity, we like to post a recap of who we are and the products we offer. Since 1993 we’ve...

View Article

Awareness of Third-party Risks

Third-party risk is quickly becoming a primary concern for many organizations as the utilization of outside resources continues to increase. These organizations are operating in a complex ecosystem...

View Article


Network Breach Awareness

A network breach, also referred to as network intrusion, refers to a cyberattack or unauthorized activity on your organization’s digital network. This breach typically jeopardizes network security and...

View Article

Image may be NSFW.
Clik here to view.

Spear Phishing

What is Spear Phishing? Spear phishing is a means of electronic communication, most commonly via email, that is targeted to a specific individual or business in an attempt to steal private information...

View Article


Fileless Malware Risk

What is Fileless Malware? Fileless malware is a type of malicious software that utilizes legitimate programs, rather than virus-laden files, to infect a host. These legitimate programs are used to...

View Article

Man-in-the-Middle Attack

What is a Man-in-the Middle Attack? A man-in-the-middle (MITM) attack is a type of cyberattack in which a cybercriminal secretly intercepts communication between two parties, therefore being “in the...

View Article

Denial of Service Attacks

What are Denial of Service Attacks? Denial of Service (DoS) Attacks are meant to shut down a network, making it inaccessible to intended users. Often, systems are shut down due to malicious traffic...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images