Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Originally posted in International Business Times on November 11, 2019
Most of the time, when organizations talk about cybersecurity, they are concerned with topics like ransomware, data breaches and whether their defenses are working. What they usually forget to discuss is how cybersecurity affects everyday consumers. These are the people who suffer from “breach fatigue”; with data breaches filling the headlines, they wonder about which ones they need to worry over and what they are supposed to do to keep their data safe.
As a cybersecurity professional, I’ve collected far too many first-hand examples of what can happen when security isn’t taken seriously. From these experiences, I’ve gleaned a few ideas about how make cybersecurity a part of my daily life – and the lives of my children.
Giving away a treasure trove of data
As the general population goes about daily life, convenience and ease of use are top of mind– risk isn’t usually a consideration. As a private citizen, you’re not likely to invest in heavy-duty cybersecurity tools. That should be the responsibility of the companies and services you’re accessing, but the key word is “should.”
There are things you can do to protect yourself in the cyber world, just as you might take basic precautions to protect your physical security. First, evaluate what you’re giving up of your own privacy and principles in order to gain the convenience you want. This varies for everyone – maybe you’re fine with your photos and comments being available to Facebook or other social media sites, but you draw the line at buying items online from small, less popular ecommerce sites. Wherever that line is for you, draw it clearly and with your data’s security in mind.
Audit your children’s online security
Whether they like it or not, children are partakers of the digital world. For example, toddlers have no say in whether their baby photos are being uploaded to the internet or turned into the latest meme. But the actual risks faced by children on the internet cannot be understated. There’s everything from the financial concerns – children getting suckered into using their parents’ credit cards to make pricy purchases – to the much more serious potential dangers of cyber bullying, identity theft and cyber predators.
We have a sacred trust to uphold: to protect the children in our care. This duty now extends to the cyber world as well as the physical world. Like most things in life, increased awareness is key – not just your own but your children’s, too. In an increasingly digital world, we owe it to our youth to help educate them about the dangers online, just as we would warn them against getting in cars with strangers and the like.
To protect your children’s digital assets, take these four steps:
A slower, safer pace
As we scroll, tap and swipe our way through the day, we have grown accustomed to blindly accepting the terms and conditions of apps or online vendors. But stronger online security means paying closer attention to what we are consenting to, particularly who gets our data. As the IoT becomes commonplace, it is more important than ever to know who has our personal information. The same goes for our children, who are growing up as digital natives but lack the life experience to automatically protect their data. Use the steps noted above to create a stronger cybersecurity posture for your whole family.
As Field CTO & Chief Cyber Risk Strategist, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working closely with the sales, marketing, product, engineering, and customer success teams to drive security outcome-focused initiatives. She has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Outside of her role at eSentire, Tia is also an adjunct professor of Cybersecurity at Yeshiva University and is currently pursuing her PhD in Cybersecurity Technology Innovation Management.