How To Build a Cybersecurity Program
Learn how to build a cybersecurity program from the cybersecurity strategy down to tactical technical security. Building a cybersecurity program is an interesting challenge within the scope of today’s Information Technology landscape. As the President & CEO of The Penn Group, building an information security program that is cost effective, robust, and agile is one of the core […]
Pursuing Compliance: Here Is Why You’re a Walking Data Breach
Cybersecurity Strategy: Compliance < Security For as long as information security has been a function of the organization, there has been justified tension between focusing on compliance and pursuing security in the matter of cybersecurity strategy. One of the most frustrating pressures to deal with as a security leader is budget. Your business stakeholders want to […]
Build Your Security Operations Center (SOC)
A Security Operations Center (SOC) reduces expenses by reducing the costs of incidents by providing visibility to your organization of security events and incidents. When working with our clients, my team at The Penn Group works around a philosophy that we believe enhances our client’s ability to make risk-based decisions. Translating academia to operationalization, the […]
How To Draft an Information Security Policy
Drafting an information security policy provides definition to your organization’s security program, enabling your team to enforce a strong security posture. One of the worst situations any information security team can find themselves in is to discover a large-scale security breach and have no idea what steps to take. Over my career as the President […]
3 Common Security Mistakes Organizations Make
Introduction Every day, cybercriminals from around the world attempt to infiltrate the systems of companies of all sizes. Unfortunately, there are 3 common security mistakes organizations make that undermine their defenses. Protecting the information systems of companies is not only the priority of security teams across the nation, but the United States government has also […]
Data Privacy is a Business Responsibility
Most people have an inherent expectation of privacy and the protection of their personal information is extremely important to them. In an odd contrast, consumers routinely provide detailed personal and financial information to companies, in order to partake in the many convenient and necessary opportunities for shopping, utilities, banking, and mobile device applications, which today’s […]
3 Steps to Protecting Yourself From Cybercrime In 2020
Protecting yourself from cybercrime in 2020 may be the last of your worries at this point. We’ve experienced the Coronavirus (COVID-19) pandemic, violence, riots, unemployment at near record highs, mass layoffs, and the year is barely halfway over. Unfortunately, now more than ever, we face an increased risk from cybercrime. With desperate times both behind […]
Cybersecurity Lessons From Coronavirus
Coronavirus & Cybersecurity I’m sure you’re probably either deathly afraid of the Coronavirus disease (COVID-19) or think that it is the biggest over-inflated media hype since the Swine Flu. Regardless of your instinct on the severity of the COVID-19, we can all tend to agree that the virus is something to be taken seriously. What […]
Your Debit Card Number Got Stolen. So What?
Recently, my friend Scott sent me a text message that read “my debit card number got stolen and they [cybercriminals] spent $800”. As the President & CEO of The Penn Group, I hear about this kind of fraudulent activity often. With 78% of Americans living paycheck to paycheck, it isn’t difficult to draw the conclusion that these […]
Ransomware is Owning Our Cities. Here is Why.
As the President & CEO of The Penn Group, I see a lot of disturbing trends within the world of technology. One of the most disturbing is the fierce debate over encryption that is ongoing between our Government and private institutions, such as Apple, Inc. On one hand, the safety and security of the United States populous is at […]