There’s more to think about this tax season than simply filing by April 18. Just ask the CEO of Sunrun.
Earlier this year, a hacker posed as the head of the residential solar company to request […]
Part two of a three-part series on credentials access assessments
You probably hear all the time about the increasing sophistication of cyber attackers. But did you know that a whopping 85 percent of attacks are preventable? […]
Part one of a two-part series on a credentials access assessment
It’s probably the worst nightmare of any employer: When a former employee with a grudge hacks your company.
According to the Federal Bureau of Investigation and […]
If you’re a fan of American football, then you know that the Atlanta Falcons had a surprisingly victorious season. You also probably know where you’ll be watching them face the New England Patriots in Super […]
“It won’t happen to me.”
When it comes to cybercrime, this is the most common myth. It’s also the most dangerous myth.
That’s because the evidence tells us otherwise. Statistical research says that at least 18 people […]
It’s everywhere in the news: Russia has been blamed for meddling with the 2016 American presidential election.
Reactions are all over the place too. Trump calls the accusation “ridiculous.” Cyber experts say direct hacking of voting […]
We all know the universal rule of thumb for gift-giving: “It’s the thought that counts.”
But I think kids everywhere would agree there’s also a universal gift-giving faux pas. It’s when a child rips open […]
You may have heard the big news. It was announced in September that 500 million Yahoo accounts had been hacked, resulting in one of the most catastrophic data breaches in U.S. history.
What was compromised?
Yahoo’s statement on […]
On October 26, 2016, the Greater Houston Partnership proudly hosted a “Cybersecurity: Corporate Governance and Risk Management” breakfast at Partnership Tower in downtown Houston. Thanks to all of our participants, the event was a great success.
Nearly every day, hackers are breaking into company networks to damage, steal, and release sensitive data, potentially putting your company and your customers at risk. If you’re a business leader or IT professional, it’s critical […]