Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Tag: Cybersecurity Posture
You are here: Home \ Cybersecurity Posture
Posted on Friday, January 17th, 2020 by
A Cybersecurity Posture Assessment gives your company the intelligence to know where you stand with respect to cybersecurity risk. The modern business faces cybersecurity challenges as never before. These challenges are being complicated by sophisticated techniques such as social engineering. Cyber-threats are compounded and facilitated through the hyper-connectivity offered by cloud computing, mobile devices, and...

Topics: Cybercrime, Cybersecurity Posture, Social Engineering, Uncategorized

Posted on Friday, January 10th, 2020 by
As cyber-attacks targeting cloud infrastructures increase, using a Cloud Security Posture Assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become firmly established by organizations of all sizes and across all sectors. A cloud-based infrastructure facilitates digital transformation, offering opportunities to use best-of-breed cloud apps to help improve...

Topics: Cloud Security, Cybercrime, Cybersecurity Posture, Digital Transformation

Credit Unions Cybersecurity Posture
Posted on Thursday, October 31st, 2019 by
How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal information such as credit scores, banking information and investment history. In this blog article, we'll talk about why cybersecurity is important for credit unions, how credit unions can evaluate and improve their cybersecurity posture, and which first steps credit unions should undertake to strengthen their security defenses.

Topics: Compliance, Control Assessment, Cybersecurity Posture, Security Practices, Tips & Tricks, Uncategorized

Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now