Cybersecurity News, Commentary & Implications for SMBs

Cybersecurity expert Adam Mansour reviews and comments on the cybersecurity news from the past week. This episode features five interesting stories, including an evolving RDP vulnerability; a new government cybersecurity standard for small to mid-sized businesses; developments in the Capital One breach; research highlighting drawbacks of using machine-only solutions; and ... Read More

Video: GDPR Exploit Implications

In this video, Virtual CISO Adam Mansour reacts to an exploit of GDPR's Right of Access, discussed by researcher James Pavur at Black Hat 2019. Adam describes the experiment, explores the consequences of having such private data exposed, and puts forward implications for those who are impacted by this exploit ... Read More

Leaders on Gartner Recognition

IntelliGO has been named a representative vendor in the Gartner 2019 Managed Detection and Response Market Guide. In this brief video we turn to IntelliGO's senior leadership to explore the outcomes that the guide drives for small to medium-sized enterprises, what inclusion means for IntelliGO, and the reasons for it ... Read More

Still Waiting to Hire a Security Analyst? Don’t!

As an organization with a growing business and IT footprint, the risks you are regularly exposed to constantly grow as well. Perhaps your board of directors is increasingly concerned about cybersecurity, given the attention paid to cyber breaches in the news, or the focus on global privacy and cybersecurity regulations ... Read More

The Role of Finance in Securing the SME

As part of our Security Takes a Village theme, IntelliGO Networks Finance Manager Sofia Nalband covers the role of finance in securing the SME. She addresses the reasons financial stakeholders should be concerned about cybersecurity threats to their business, the practices such stakeholders can implement to reduce the risk of ... Read More

Building a SOC Without Even Knowing It

This is for all those who say “I’m way too small to be building a Security Operations Center (SOC) – all I need right now is a <insert any piece of cybersecurity technology here>” … because whether you know it or not, you are embarking on the lengthy, complex, and ... Read More

Why Every Leadership Meeting Should Include a Cybersecurity Update

As part of our “C-Suite Accountability” theme, we explore why holding senior executives accountable is a necessary motivator in the prioritization, development, and adoption of cybersecurity initiatives across the small to medium-sized organization. In this post, we cover the importance of establishing visibility into the problem and your progress in ... Read More

End-users: from Weak Link to Security Enabler

End-users have a rough time when it comes to cybersecurity. Described as “the weakest link” in an organization’s security, end-users are often blamed for dire organizational consequences resulting from their credentials becoming compromised, or from their device becoming infected. Yet, where do policy and direction of leadership end, and actions ... Read More

Where is Your Data and What Does it Do?

Sensitive data has long been a problem for large enterprises – but what about small to medium-sized organizations? With the increasing connectedness of (cloud) systems, access by multiple external parties, the proliferation of data and new uses for it, executives are having difficulty understanding where their data is, how it ... Read More

HR’s Role in Protecting Your Business

As part of our “security takes a village” theme, we are exploring how stakeholders other than dedicated cybersecurity or IT teams can take part in the protection of your organization. Today our own HR Manager Alyssa Miller looks at cybersecurity challenges facing HR, ways that HR stakeholders can help protect ... Read More