Cybersecurity Awareness Month – Week 2

By | Cybersecurity | No Comments

Let the Cybersecurity Celebration Continue!!! October is National Cybersecurity Awareness Month and the second week focuses on cybersecurity in the workplace.  At one time, it was thought that cybersecurity was solely the responsibility of the IT department.  This is simply not the case anymore as everyone needs to be involved in building and supporting a culture of cybersecurity in the workplace.   What should you be doing? We will break down some key things to focus on at each level. Employee Level: Consider yourself the on the front line of the cybersecurity battlefield.  Many attacks are successful due to thinking…

Read More

Cybersecurity Awareness Month – Week 1

By | Cybersecurity | No Comments

Let’s Celebrate National Cybersecurity Awareness Month! October is National Cybersecurity Awareness Month with the goal to promote awareness and proper cybersecurity practices for all.  Each week of National Cybersecurity Awareness Month has a specific theme, with the first being “Simple Steps to Online Safety.” We at Alpine Cyber would like to share with you some basic cybersecurity concepts and tips to always keep in mind as you are navigating through your online life. Since more and more of our activities and services are being moved online, we truly need to put cybersecurity first in our daily lives. Passwords Once upon…

Read More

What you need to know about 23 NYCRR 500.

By | Cybersecurity | No Comments

NY DFS 23 NYCRR 500 and You March 1, 2017 is quickly approaching.  This is the day when the State of New York’s Department of Financial Services (DFS) will officially enact the new cybersecurity requirements detailed in NY DFS 23 NYCRR 500.   What could this mean for your company?  If you do business in New York and fall under the DFS (Banking, Financial Services, Insurance, or even Educational Institutions), there is likely some work ahead that needs to be done.  While there are some exceptions in the new regulations, even the small firms have to pay attention. Establish a Cybersecurity Program If you…

Read More

Horton Hears A Host! – Part 3

By | Cybersecurity | No Comments

Welcome to the third post in our multi-part Seusstastic series on the real threats that face home networks, where we apply real-world enterprise grade protections to keep ourselves safe in the connected world. If you haven’t read part 1 or part 2, I highly recommend you take a few minutes and do so. We’ve covered how cyber thieves are constantly testing and scanning for vulnerabilities and what you can do to start acting like the bad guy – finding the systems on your network. We left you with the following point: devices that we previously would never have imagined to exist on a…

Read More

One Host, Two Hosts, Red Host, Blue Host – Part 2

By | Cybersecurity | No Comments

This is the second post in our multi-part Seusstastic series on the real threats that face home networks, where we can apply real-world enterprise grade protections to keep ourselves safe in the connected world. First off – If you haven’t read part 1, I highly recommend you take 5 minutes and do so. In part 1, How The Grinch Stole… Your Information, I presented a simple construct: Cyber thieves are not only just outside your physical and digital homes, they are constantly testing and scanning for vulnerabilities. The argument is simple: Thieves will be thieves and you can’t just sit back…

Read More