Cybersecurity strategy resources helping organizations proactively defend against evolving threats.

Cyber Tide Season 1, Episode 4: Mark Sangster & Robert Darling Recap How Their Field Experience Shaped Their Ability to Deal with Cyber Crises, Cyber Crime, & More

In episode four of Cyber Tide, Mark Sangster, Chief of Strategy at Adlumin, and Robert Darling, Founder at Flash-EM recap their experiences from RSAC 2023, how their experiences in the field have help shaped their abilities to deal with cyber crises, the scope of the problem of cybercrime, and more.

You can subscribe to CyberTide via Apple and  Spotify.

About the Cyber Tide Series

Dive beneath the surface of infamous cybersecurity attacks to learn the means and motives of cyber adversaries. In each episode, we invite an expert to reveal the contributing factors and costs of cyber incidents and how your firm can protect itself from business-disrupting cyberattacks.

Cyber Tide Season 1, Episode 3: Three Lessons from Law Enforcement for Small to Medium-Sized Organizations

Adlumin co-hosts Mark Sangster, VP of Strategy, and Tim Evans, Co-founder and EVP, go below the headlines to learn from FBI veteran and EVP – CISO, John Caruthers at Triden Group.

John shares his experiences as a supervisory special agent focused on national cybersecurity, legal attaché to European police liaison, and his work supporting various businesses through cyberattacks. Sangster and Evans discuss his work in manufacturing, executive awareness training, and the lessons learned fighting state-sponsored actors.

You can subscribe to CyberTide via Apple and  Spotify.

About the Cyber Tide Series

Dive beneath the surface of infamous cybersecurity attacks to learn the means and motives of cyber adversaries. In each episode, we invite an expert to reveal the contributing factors and costs of cyber incidents and how your firm can protect itself from business-disrupting cyberattacks.

Listen to Cyber Tide Episode 3

Local-Level Threats: Cybersecurity Strategies for Regional Businesses

Register for Adlumin’s Upcoming Webinar:

Local-Level Threats: Cybersecurity Strategies for Regional Businesses

Date: February 16, 2023
Time: 1:00 PM- 1:30 PM Eastern
Attendee Linkhttps://adlumin.com/webinar/local-level-threats-cybersecurity-strategies-for-regional-businesses/

Securing your infrastructure is a challenge for any business in 2023. Between the uncertainty of the current economic landscape and the difficulty of maintaining on-premise and cloud hybrid environments, cybersecurity teams must factor in a lot of moving parts. For regional businesses, the problems are often exacerbated by less-developed security strategies, limited resources — and a higher volume of cyberattacks. To protect against these digital threats, regional organizations must explore the right cybersecurity solution for their specific needs.

Security solutions that work for an enterprise-scale business are not always what’s best for regional companies. Join cybersecurity experts and enthusiasts from Adlumin and ESG as they uncover threats regional businesses should be paying attention to and outline how to find a Security Operations vendor that fits your architecture. Reserve your spot.

Tune in to learn:

  • What unique security challenges are plaguing regional-level organizations?
  • How do you conduct an internal security audit and pinpoint your Security Operations Platform needs?
  • What differentiates the Adlumin Platform?
  • Why are transparency, MDR Services, and live reporting important?

Navigating Strong Personalities: Effective Leadership in Cyber Crisis Management

By: Mark Sangster, Chief of Strategy

In a cyber crisis, who makes the decisions: The senior person? The technical expert? The self-appointed hero? When it comes to effective crisis leadership, removing emotion is critical. This guide identifies six personalities that emerge during a cyber crisis and how to harness challenging styles.

You’ll learn about the following personalities:

  • The Hero
  • The Martyr
  • The Hinderer
  • The Hoarder
  • The Captain

Harness Each Personality

Everyone metabolizes stress differently. To be the most effective leader during a cyber crisis, it is important to learn how to navigate the pitfalls of the human element. Quickly identifying learning types helps team leaders and executives assign specific members to the incident response team and assign responsibilities and tasks.

Download The Ultimate Guide to Managing Strong Personalities During a Cyber Crisis to learn how to manage these personalities properly.

Raising Awareness Through Cybersecurity Awareness Month (CAM)

By: Cybersecurity & Infrastructure Security Agency (CISA)

It’s October, so we are officially kicking off Cybersecurity Awareness Month (CAM). The annual initiative, driven by the Cybersecurity & Infrastructure Security Agency (CISA), is dedicated to raising awareness about the importance of prioritizing cybersecurity. This year’s overarching theme is “See Yourself in Cyber,” encouraging us all to see the roles we play in cybersecurity actively.

Cybersecurity has become one of the biggest hot topics inside and outside technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

And with this onslaught of negative news, it can be easy for everyday individuals to become overwhelmed and feel powerless in the face of the “insurmountable” threats posed by cybersecurity. But in actuality, nothing could be further from the truth.

With all the jargon typically thrown around in cybersecurity, there is a longstanding misperception that cybersecurity is beyond everyday people and that it should be left to professionals. Moreover, there is a prevailing sense among the public that breaches are simply a fact of life and that we should just learn to deal with them. But this just isn’t true. In fact, everyday people have a huge role to play in cybersecurity threat prevention, detection, and remediation. For example, according to IBM, 95% of breaches have human error as a main cause. Therefore, everyday day technology users are very much the first line of defense when it comes to thwarting cybercrime. Unfortunately, though, many individuals are not aware of some of the best practices for boosting cybersecurity and how easy they are to use.

With that, here are a few key best practices that everyday people can implement today to enhance their own cybersecurity and create a more secure world for everyone.

  1. Watch Out for Phishing

    Phishing – when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links – remains one of the most popular tactics among cybercriminals today. In fact, 80% of cybersecurity incidents stem from a phishing attempt. However, while phishing has gotten more sophisticated, keeping an eye out for typos, poor graphics, and other suspicious characteristics can be a telltale sign that the content is potentially coming from a “phish.” In addition, if you think you have spotted a phishing attempt, report the incident so that internal IT teams and service providers can remediate the situation and prevent others from possibly becoming victims.

  2. Update Your Passwords and Use a Password Manager

    Having unique, long, and complex passwords is one of the best ways to boost your cybersecurity immediately. Yet, only 43% of the public say that they “always” or “very often” use strong passwords. Password cracking is one of the go-to tactics that cybercriminals turn to in order to access sensitive information. And if you are a “password repeater,” once a cybercriminal has hacked one of your accounts, they can easily do the same across all of your accounts.One of the biggest reasons that individuals repeat passwords is that it can be tough to remember all of the passwords you have. Fortunately, by using a password manager, individuals can securely store all of their unique passwords in one place. Meaning people only have to remember one password. In addition, password managers are incredibly easy to use and can automatically plug in stored passwords when you visit a site.

  3. Enable MFA

    Enabling multi-factor authentication (MFA) – which prompts a user to input a second set of verifying information such as a secure code sent to a mobile device or to sign in via an authenticator app – is a hugely effective measure that anyone can use to reduce the chances of a cybersecurity breach drastically. In fact, according to Microsoft, MFA is 99.9 percent effective in preventing breaches. Therefore, it is a must for any individual that is looking to secure their devices and accounts.

  4. Activate Automatic Updates

    Making sure devices are always up to date with the most recent versions is essential to preventing cybersecurity issues from cropping up. Cybersecurity is an ongoing effort, and updates are hugely important in helping to address vulnerabilities that have been uncovered as well as in providing ongoing maintenance. Therefore, instead of trying to remember to check for updates or closing out of update notifications, enable automatic update installations whenever possible.