HTG Weekly Blog

 

#vulnerability (2)

2 min read

The Importance of Cybersecurity Training for Personnel

While everyone makes mistakes, some people's slip-ups might be more costly than others. Cyber mistakes can be very expensive. According to research...

Read More

2 min read

What is your Cyber Risk?

Whether you like it or not, if you work in information security, you are in the risk management industry. Risk assessments are nothing new. The...

Read More

2 min read

Patch Management is Essential for SMBs

Consider yourself on a bicycle when a nasty bump unexpectedly comes and bursts your tire. Your day might be ruined, but if you have a repair kit and...

Read More

1 min read

CISA Creates the Election Security Risk Profile Tool

The Joint Cyber Defense Collaborative (JCDC) and CISA collaborated to create the "Protecting U.S. Elections: A CISA Cybersecurity Toolkit," which...

Read More

2 min read

Congress to Vote on Upcoming Cyber Legislation

There are many hearings and bills related to technology and cyberspace scheduled for the House and Senate's final days of work before their summer...

Read More
Costa Rica Map with Target

2 min read

Costa Rican Gov. Targeted in Conti Cybercriminal Group's Latest Attack

Following a month of devastating ransomware attacks carried out by the Conti cybercriminal group, Costa Rica's newly elected president, Rodrigo...

Read More

2 min read

New PA Bill to Allow National Guard to Counter Cyber-Attacks

The State of Pennsylvania unanimously passed House Bill 2412 on 4/27/2022, to allow the use and expertise of the Pennsylvania National Guard to...

Read More

2 min read

Your Employees Are Your Organization's Biggest Risk to Cybercrime

The workplace environment has seen a drastic shift in the attitude about the value of a physical workspace. For some, return-to-work plans...

Read More

2 min read

How Cyber Insurance Can Protect Your Business

Cyber insurance offers businesses protection from financial losses created by cyber-attacks, including system hacking, data breaches, and ransomware...

Read More

3 min read

Business Email Compromise

Small and medium-sized businesses are frequently targeted by Business Email Compromise (BEC) scams that attempt to deceive victims into sending...

Read More