MAD Security BlogFind the most up-to-date trends, insights, and information on the cybersecurity industry right here.
Phishing attacks expend very little resources from attackers and are extremely effective. Users are generally the weakest link in the security of an organization and the path of least resistance for most attackers. Reducing the amount of phishing emails that reach your users is critical for decreasing the likelihood of a breach.read more
In this blog post, we’ll take a look at some common threats you’re likely to see throughout 2019, and over the next several weeks we will go in-depth on prevention and mitigation of these types of attacks.read more
Marriott’s recent breach highlights some of the major challenges for the hotel industry surrounding cybersecurity and mergers and acquisitions. In this blog, we’ll discuss what exactly happened and what you can do to avoid such attacks.read more
Cybersecurity programs today run the gamut of being nonexistent to very robust. In this blog, MAD Security’s Cliff Neve will discuss 7 key steps in building a winning cybersecurity program.read more
Financial entities and their regulators are facing the challenge of mitigating these 4 hot button cybersecurity risks daily. In this blog post, we discuss ways to mitigate them with our partner, VMS Consulting.read more
As cyberattacks and data breaches are revealed and reported on a regular basis, new compliance requirements will continue to be implemented. In this post, we’ll focus on NIST 800-171, what we can expect from it this year, and how to maintain compliance throughout 2018 and beyond.read more