Learning Center
Cybercrime | Network Assessment | Cybersecurity
By:
Evan Rice
October 15th, 2021
So, your company received a cybersecurity assessment to identify gaps and risks within your network, but now, you’re left wondering how to create an actionable plan with this new knowledge. Simply identifying the issues isn’t enough to keep the hackers away once they discover vulnerabilities to exploit. The first thing you need to do is bridge the gap between a cybersecurity assessment and what it is to be a secure business. It’s important to remember, good cybersecurity is never complete and shouldn’t be a one-time response to an assessment.
Security | Cybercrime | Consulting
By:
Evan Rice
August 13th, 2021
Cybersecurity is recognized as one of the fastest-growing technology markets globally. According to Gartner, enterprise spending on cloud security solutions is predicted to increase from $636M in 2020 to $1.63B in 2023, attaining a 26.5% compound annual growth rate (CAGR).
By:
Evan Rice
May 19th, 2021
Have you ever wanted to live on a cloud? The reality is today many of us do. Most aspects of our lives are available for collection, display, and analysis in systems that do not physically belong to us: they are “the cloud”. Gmail, YouTube, TikTok, Snapchat, Facebook, and even retailers, like Amazon and Walmart, all house and use data about each and every one of us. Businesses, like individuals, also live in the cloud. The ability to offload computing resources to a trusted cloud partner has reduced capital expenditures and maintenance overheads for companies worldwide. There is also an assumption that cloud security prowess is automatically transferred to the subscriber’s systems when they migrate to the cloud. This can be true, but BUYER BEWARE, no system is truly hands-off when it comes to security. The reality is all systems, cloud or otherwise, need to be configured properly to ensure security risks are eliminated.
By:
Evan Rice
May 12th, 2021
Julio and Melissa make up the entirety of the IT department for their company. They are the Jack and Jill of all trades, and they do a fantastic job making sure the company’s systems are up, end user issues are resolved, and new tools are made available when needed.
By:
Evan Rice
May 5th, 2021
Joan works at a small, local manufacturing company; her company makes highly specialized chemical testing sensors used in various applications all over the world. Joan’s job is to process orders and make sure that the products are shipped out to the customers on time. She loves her job and would never do anything to jeopardize losing it.
By:
Evan Rice
April 14th, 2021
In this series, CCI Systems (Blue Team), and partners FRSecure (Red Team), will uncover the top five most common ways the healthcare industry and other organizations are being attacked by hackers and what you can do to help stop attacks before they mitigate. Our partners FRSecure will discuss what the attack vector is, what specifically attackers do within that vector to achieve a compromise, and some examples of those attacks and stories within the healthcare industry. CCI Systems will explain how to avoid being compromised using that vector—how to protect yourself and mitigate the risk of falling under the same trap.