Sage Advice - Cybersecurity Blog

Loren Lachapelle

Recent Posts

The 2020 Threat Outlook

Hackers are constantly developing new ways to infect systems globally. As threat detection services and security teams catch on to their tactics, they continue to build and deploy new malware to feed their personal wallets. We are seeing more malware than ever, and this cycle will only get worse. Let’s review the predicted threat environment for 2020.

Read More

Topics: Threat Intelligence, Cyber Defense, Cybersecurity Awareness

The Information Security Policy Lifecycle

Regardless of whether a policy is based on guiding principles or regulatory requirements, its success depends in large part upon how the organization approaches the tasks of policy development, publication, adoption, and review. This process is collectively referred to as the policy lifecycle. The responsibilities associated with the policy lifecycle processes are distributed throughout an organization. Organizations that understand the lifecycle and take a structured approach will have a much better chance of success with their cybersecurity practices. Let’s breakdown the Information Security Policy (ISP) lifecycle into further detail.

Read More

Topics: Cybersecurity, Security Policy, Information Security

Information Security Risk Policies

Once you’ve chosen a format and have started planning your Information Security Policy (ISP) documents, you must understand and document risk – a factor that will influence how you make decisions within the organization and develop your policy to its fullest potential.

Read More

Topics: Cybersecurity, Risk Management, Cybersecurity Awareness

How to Start Developing Your ISP

The role of policy is to codify guiding principles, shape and require behavior, provide guidance to those who are tasked with making present and future decisions, and serve as an implementation roadmap. An information security policy (ISP) is a directive that:

Read More

Topics: Cybersecurity Tips, Regulations, Information Security

3 'Must Have' Cybersecurity Documents

We see news of devastating cyberattacks every day in private and public organizations of all sizes. From phishing attempts, to business email compromises, to full-blown ransomware attacks, any device that’s connected to the internet is at risk for an attack.

Read More

Topics: Security Policy, Incident Response, Information Security

Five Cloud Security Lessons

During the closing session of the 2019 CyberCrime Symposium, we heard from Tyler Cybersecurity clients and our partners at Amazon Web Services (AWS) about their experience using cloud services. Each person brought a different, but insightful perspective to the table and shared what’s been working for them (or not) in the cloud. Let’s recount the top lessons we learned from the session.

Read More

Topics: CyberCrime Symposium, Cloud Security

Cyber Liability Insurance Explained

With the number of cyberattacks occurring today, it’s especially important for companies to be knowledgeable when it comes to cybersecurity best practices, how to create and nurture cybersecurity culture, and how to hunt for threats on the network. But no organization – large or small, public or private – is immune to a data breach, even with appropriate security measures in place.

Read More

Topics: Cybersecurity, Cybersecurity Tips

4 Steps to a Privacy Initiative Roadmap

Digital privacy is an evolving, hot topic in the world right now. With the rise of ecommerce, digital marketing, online offers, and smart devices, it’s extremely difficult not to have your personal information – whether that be transactional information or information that defines you – out there. But what if we thought about it from the standpoint of your business? How can you make sure your organization is protecting individuals’ data and using best privacy practices? Let’s delve in to how you can create a privacy initiative roadmap for your organization.

Read More

Topics: Privacy

Privacy Regulations: What You Should Know

As consumers, our information is everywhere. With nearly everything connected to the web, it’s nearly impossible not to have your personal data out there. Because of this, privacy is a hot topic, now, more than ever. This means that entities must take precautions to protect the valuable data they have on you so that your personal data is not stolen.

Read More

Topics: Privacy

Why Does Privacy Matter?

Digital privacy is an evolving topic that is increasingly part of the cybersecurity discussion. Private information is transmitted in nearly every interaction of every day, from digital habits such as app and website uTyler, to purchases, to driving habits. Looking back at recent data breaches, it’s interesting that the largest breaches didn’t involve stolen credit card or social security numbers. Instead personal information is being stolen in large quantities. This private information is not only extremely valuable to us as individuals, but it’s becoming increasingly attractive for cybercriminals as well.

Read More

Topics: Privacy