Sage Advice - Cybersecurity Blog

Steps You Can Take Now Against CyberCrime

CyberCrime-Call-To-Action-1As fall approaches, all of us at Tyler Cybersecurity are getting excited for the upcoming 2015 CyberCrime Symposium being held November 5 - 6 in Portsmouth, NH. With registration open, it's a great opportunity to take a look back at some of the key takeaways from the 2014 Symposium - important tips that are still important to fighting cybercrime today!

If you didn't go looking for it, don't install it.
If you installed it, update it.
If you no longer need it, junk it.

-- Brian Krebs, Author of SPAM NATION and Editor,

The universe of threats may seem limitless, but nine out of ten of all breaches can be described by just nine basic patterns, drastically simplifying what we all must deal with to protect information assets.

-- Bob Rudis, Security Data Scientist, Cybersecurity Research & Innovation at Verizon Enterprise Solutions

Bitcoin is not just a currency. At its core, bitcoin offers a de-centralized secure time-stamped database that can form the root of a trust model.

-- Andreas M. Antonopoulos, Technologist

The best digital defense is your workforce. Train and educate EVERYONE to recognize the telltale signs of cyber-attack, both technical AND reputational.

-- Chris Dufour, Director White Canvas Group

Safeguard your personal information, whether it is on paper, online, or on your computers and mobile devices. Placing both extended fraud alerts and credit freezes on your credit reports can make it more difficult for an identity thief to open new accounts in your name.

-- SSA Matt O'Neill

Keys for mechanical locks should be treated like valuable personal information; do not loan or share them because they can be easily cloned, copied, and decoded. Mechanical keys for locks and credentials for program access are the same thing - they both should be treated as confidential information and protected.

-- Marc Weber Tobias, J.D.

A good password is one that is easy to remember, hard to guess, and impossible to brute force.

- Per Thorsheim, Founder, PasswordsCon

Threat feeds are information, not intelligence. When building a threat intelligence program the goal is to achieve preemptive intelligence. Be ahead of the threat, not behind.

- Lance James

Practiced incident response capability is the difference between success and failure.

- Sari Greene

The 2015 CyberCrime Symposium has an incredible line-up of industry experts, thought leaders, and security practitioners, including two esteemed journalists and authors - Kim Zetter (Countdown to Zero Day) and Shane Harris (@War).  Learn more about the CyberCrime Symposium at

No one is immune to cyber-attacks

Be confident that threats to your network will be detected consistently and accurately with Tyler Detect. Our team of cybersecurity experts actively investigates to find threats and are always ready to offer you support and answer your questions.

Learn More

Topics: Sage News, CyberCrime Symposium, Cyber Defense

The Tyler Cybersecurity Lifecycle

Cybersecurity isn’t a destination.

Cybersecurity Lifecycle

There is no single, straight path that will get you to the point where you can say, “We did it! We’re 100% cyber-secure.”

A more realistic destination is cyber resiliency – the ability to prepare for and adapt to changing conditions, so you can withstand and recover rapidly from disruptions. Achieving cyber resilience depends on what we like to call the cybersecurity lifecycle – an ongoing cycle of interconnected elements that compliment and reinforce one another.

Learn More