Cover the Basics for Securing Your Network — Shawn Tuma’s Book Contribution

Shawn Tuma authored a section for an eBook published by Fortinet Security. You can read Tuma's section, Cover the Basics, as well as download the complete eBook at this link: Cover the Basics- by Shawn E. Tuma | MightyGuides.com

Is your business prepared to respond this quickly to a data breach?

Customers and the public expect a very quick response to a data breach -- within a matter of a few days. That is the new standard. If your business is not prepared ahead of time for such a response, it will be impossible. Your business needs a response plan in place with all of the key … Continue reading Is your business prepared to respond this quickly to a data breach?

Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)

Wow, this article seriously just made my day. I will apologize in advance to my friend and CSO writer and Michael Santarcangelo (@catalyst), but this may very well be my favorite article -- anywhere -- of all time! And, thank you, Tom Hulsey (@TomHulsey), for sharing it with me! As for you, Ms. Kacy Zurkus (@KSZ714), all I can … Continue reading Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)

Why Your Company Needs a Breach Response Plan: Key Decisions You Must Make Following A Data Breach

Companies must be prepared for a data breach. It is just a fact of life, plain and simple. The developing standard of care requires that companies give some thought to how they will respond when the inevitable occurs -- and they really, really, really should have a written Incident Response Plan in place. This is part … Continue reading Why Your Company Needs a Breach Response Plan: Key Decisions You Must Make Following A Data Breach

Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water

"You don't drown from falling into the water, you drown from not getting out." Think about that -- and think about how that applies to cyber security and data breach issues facing companies in today's cyber world. Here, in my first ever video blog post, I explain this issue with more detail.