Looking Back on Cybersecurity Awareness Month and a 365 Day Outlook

Cybersecurity Awareness Month may be coming to a close, but we have already set our eyes on the future. The question is: How can we stay “security aware” year round and, more importantly, translate this awareness into actions that will help keep our companies secure?

Cybersecurity has never been more important than in the past few years. It seems that every week, a major new breach hits the news headlines, leaving every company more and more worried about whether they’re next. This month — National Cybersecurity Awareness Month — has been a great reminder to verify whether your security protocols and practices are up-to-date and effective. But with the state of things today, you can’t afford to stop there.

We believe that done right, security is a 24/365 operation. If you’ve been following our blog, you’ve learned that there are many ways to streamline and automate security so it doesn’t require an army to maintain.

In this post, we’re wrapping up our best pieces of advice for you so that every month going forward can be cybersecurity month at your company. Read more “Looking Back on Cybersecurity Awareness Month and a 365 Day Outlook”

How We Can Turn National Cybersecurity Awareness Month Into Cybersecurity Action

Want to take a peek at the World’s Worst Data Breaches? Here you go:

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/


Now that we’ve got that out of the way, let’s start this blog post over again. Our goal isn’t to frighten you or deepen the numbness you might already be feeling from the drip, drip, drip of bad cyber news.

It’s National Cybersecurity Awareness Month (NCSAM), which was launched in October 2004 as a collaboration between the National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security with the goal of raising awareness and providing education on cybersecurity issues.

The name is something of a misnomer, however. NCSAM is really designed to do more than make you aware of cyber risks. It’s bigger goal is to arm you with information and tools you can use to strengthen yourself, your social groups, and your businesses against the cyber criminals who prey on us.

In the spirit of NCSAM, we at Threat Stack want to do our part by sharing some of the advice our bloggers have offered on how to take action to protect yourself and your company from cyberattacks. With that in mind, here are summaries of four recent blogs. Read more “How We Can Turn National Cybersecurity Awareness Month Into Cybersecurity Action”

Massachusetts Takes Leadership Role in Cybersecurity

Threat Stack Welcomes New Massachusetts Cybersecurity Growth and Development Center

Last week, during the inaugural Cybersecurity Forum, Massachusetts Governor Charlie Baker announced the brand new, Cybersecurity Growth and Development Center at the Massachusetts Technology Collaborative. The goal of the new public institution is to unite the cybersecurity sector in Massachusetts, while also training new talent — a huge win given the acute skills shortage that exists today. At Threat Stack, we couldn’t be more pleased or supportive. Read more “Massachusetts Takes Leadership Role in Cybersecurity”

Boston-Based Venture Capitalists Weigh in on the Importance of Cybersecurity

At Threat Stack we have developed best practices around cloud security — when it should be introduced, what it should cover at each stage of the security maturity lifecycle, whether a company should build or buy — and so on.

But we always want to hear what other experts have to say. So we recently asked two leaders in Boston’s VC community — Greg Dracon of Boston’s .406 Ventures and Gaurav Tuli, of F-Prime Capital Partners — to share some of the security-related insights they’ve gained from their extensive experience guiding start-up and early-stage companies to success over the years.

Without further commentary, here’s what Greg and Gaurav had to say . . . Read more “Boston-Based Venture Capitalists Weigh in on the Importance of Cybersecurity”

Better Security Through UX, Part 2: Visual Design and Emotion

In Part 1 of this series, I introduced the theme that good user experience (UX) design can actually promote better security overall, by fostering trust and encouraging people to use their security tools more often. We looked at how Threat Stack approaches this topic through the lens of onboarding, or first-time use. Now we’re going to see how this theme plays out in the overall aesthetics, and visual appeal, of the Threat Stack Cloud Security Platform™.

Read more “Better Security Through UX, Part 2: Visual Design and Emotion”

5 Tips for Reinforcing Your Organization’s Cloud Security

It’s every executive’s worst nightmare: becoming the next Target- or Anthem-style data breach headline. But aside from just hoping and praying that you won’t be the next victim, you can take some very practical and actionable steps to keep your organization safe and to ensure that, if you are breached, you’ll know right away.

Read more “5 Tips for Reinforcing Your Organization’s Cloud Security”