Blog Posts

SEC, FINRA, financial, cybersecurity Christian Grupp SEC, FINRA, financial, cybersecurity Christian Grupp

What are the cybersecurity requirements for firms registered with the SEC?

As a financial firm registered with the Securities and Exchange Commission (SEC), you have a responsibility to protect sensitive customer information from cyber threats. The SEC has implemented a number of cybersecurity requirements for firms registered with the agency to help protect against data breaches and other cyber incidents. In this blog post, we will discuss the key cybersecurity requirements for firms registered with the SEC.

Read More
cybersecurity, SEC, FINRA, financial Christian Grupp cybersecurity, SEC, FINRA, financial Christian Grupp

What are the cybersecurity requirements for individuals registered with the SEC?

As an individual registered with the Securities and Exchange Commission (SEC), you have a responsibility to protect the sensitive information of both your clients and your company. With cyber threats becoming increasingly sophisticated and frequent, it's more important than ever to understand and comply with the cyber security requirements set forth by the SEC.

Read More
hack, defense, cybersecurity Christian Grupp hack, defense, cybersecurity Christian Grupp

What is the chance I will be hacked?

As a small business owner, you may think that your organization is not likely to be hacked. However, small businesses are increasingly becoming targets for cyber criminals. In fact, according to a report from the National Cyber Security Alliance, 60% of small businesses go out of business within six months of a cyber attack. In this blog post, we will discuss the likelihood of small businesses being hacked, the average cost of a hack, and the risk-weighted cost that small businesses bear each year.

Read More
ciso, cybersecurity Christian Grupp ciso, cybersecurity Christian Grupp

Do I need a CISO (Chief Information Security Officer)?

As a business owner, you may be wondering if your organization needs a Chief Information Security Officer (CISO). A CISO is responsible for leading an organization's overall cybersecurity strategy and ensuring that the organization is protected from potential cyber threats. While not every organization needs a full-time CISO, there are several factors to consider when determining whether or not to hire one, or if you could use a part-time CISO.

Read More
cybersecurity, threat Christian Grupp cybersecurity, threat Christian Grupp

I am a Small Business, do I need to worry about cybersecurity?

As a small business owner, you may think that your organization is not a likely target for cyber attacks. However, small businesses are increasingly becoming targets for cybercriminals, as they often have weaker security measures in place compared to larger organizations. In this blog post, we will discuss why small businesses should be concerned about cybersecurity and the steps they can take to protect themselves.

Read More
vulnerability, threat, cybersecurity Christian Grupp vulnerability, threat, cybersecurity Christian Grupp

What is the difference between a vulnerability and a threat?

When it comes to cybersecurity, it's important to understand the difference between a vulnerability and a threat. A vulnerability is a weakness in a system, network, or device that could be exploited by an attacker, while a threat is a potential danger that could take advantage of that vulnerability. In this blog post, we will discuss the difference between a vulnerability and a threat and how they relate to cybersecurity.

Read More
risk, assessment, cybersecurity, risk assessment Christian Grupp risk, assessment, cybersecurity, risk assessment Christian Grupp

How do I assess risk?

Assessing risk is an essential part of any organization's overall security strategy. It involves identifying, evaluating, and prioritizing potential risks that could harm an organization's assets, reputation, and operations. In this blog post, we will discuss the process of assessing risk and some of the key steps involved.

Read More
cybersecurity, framework, ISO 27001, cis controls, COBIT Christian Grupp cybersecurity, framework, ISO 27001, cis controls, COBIT Christian Grupp

What is a risk management framework? What are the most common?

Risk management is an essential part of any organization's overall security strategy. It involves identifying, assessing, and mitigating potential risks that could harm an organization's assets, reputation, and operations. A risk management framework is a structured approach to managing risks, and it can help organizations better understand and manage the risks they face. In this blog post, we will discuss what a risk management framework is and some of the most common frameworks used today.

Read More
OWASP Top 10, defense, pentest, cybersecurity Christian Grupp OWASP Top 10, defense, pentest, cybersecurity Christian Grupp

What is the OWASP Top 10?

The OWASP Top 10 is a list of the most critical web application security risks that organizations face. The OWASP (Open Web Application Security Project) is a non-profit organization that is dedicated to improving the security of web applications and services. The OWASP Top 10 is updated every three years to reflect the current state of web application security risks. In this blog post, we will discuss the OWASP Top 10 and why it is important for organizations to be aware of these risks.

Read More
windows, cybersecurity, defense Christian Grupp windows, cybersecurity, defense Christian Grupp

Are All Windows Devices Insecure?

Windows devices, like any other technology, are susceptible to security threats. However, the idea that all Windows devices are insecure is a common misconception. In this blog post, we will discuss the security of Windows devices, the types of security threats that Windows devices face, and the steps that users can take to protect their devices and personal information.

Read More