Data Protection
As hurricane season approaches, businesses face the daunting task of safeguarding their critical data amidst the potential chaos. The impact of hurricanes extends beyond physical damage, posing a significant risk to valuable data. With 13…
Last month, Microsoft Threat Intelligence discovered a security vulnerability in Microsoft Outlook for Windows that could allow hackers to steal user login credentials when they access email from an unsecured network, such as the Internet.…
Cybersecurity threats are increasingly sophisticated and frequent, and the impact from these attacks keeps rising. With more data sources than ever, cybercriminals are stealing more records than ever – billions annually – to sell and…
The healthcare industry continues its reign as the number one cyber attack target. For 12 consecutive years, the healthcare industry has incurred the highest breach-related financial damages of any industry with an average cost of…
Cybersecurity Rule 206(4)-9 for investment advisers and private funds is expected to be finalized April 2023 according to the SEC’s 2023 regulatory agenda. Proposed in February 2022, the rule is designed to promote a more…
2022 saw continued supply chain disruptions, the evolving pandemic, the Russia-Ukraine war, rising inflation, rising energy costs, and a looming recession that impacted business operations and plans. Despite these challenges, or perhaps because of them,…
What Is Immutability? In the basic sense, to be immutable means to be unchangeable. Something that is fixed, set, or permanent can also be said to be immutable. In the world of cybersecurity and disaster…
There are times when you, as a business owner, might receive unsolicited emails from organizations asking you to try a product or asking for your input on something. More likely than not, the one responsible…
Proposed on February 9th, SEC 38a-2 would help bolster the cybersecurity posture of investment institutions in the US by holding undersecured, non-compliant parties responsible for fallout and reporting of breach events. Now reinforced by cyber…
As tensions at the Ukraine-Russia border continue to rise, the likelihood of widespread security threats follow suit. Today’s militaries allocate significant effort and resources into their cyberattack forces, far different from the kinds of conflict…
Thrive’s cybersecurity experts are excited to announce the launch of their Security Resource Center! This new home base for all of the latest security tools, tips, news, and insights directly from Thrive’s cybersecurity team is…