Main Menu
  • Filter:
image
Blog

How Do You Manage Ransomware Risk?

Ransomware has become an all-too-common occurrence in today's digital world. With threat actors constantly evolving their tactics and developing new threats, protecting your organization against ransomware attacks can be difficult. However, following these 5 best practices can minimize your risk:...

image
Blog

What to Know About Cybersecurity For Your Home & Family

Internet is an integral aspect of modern life. One that has brought us many conveniences and transformed businesses and human connection. However, this world of connection has brought many challenges...

image
Blog

What is the number one way to prevent shadow IT?

Shadow IT continues to be prevalent in many organizations, bringing unknown and unmitigated risks into your environment. Several factors have accelerated the presence of shadow IT in recent years, such...

image
Video

Part 3: Why Isn't Vendor Risk Going Away?

Vendor risk management should be a key part of your organization's cyber risk management program, especially if you rely on third-party providers.

image
Video

Part 2: Why Does Vendor Risk Matter?

Cyber risk increases when companies outsource their critical business operations to third parties, so vendor risk management should be a key part of your organization's risk management program.

image
Video

Part 1: What is Third Party Risk Management?

Third-party risk management programs oversee three main areas of your vendor lifecycle: due diligence with policy and procedures, the monitoring process and vendor termination.

image
Whitepaper

Third-Party Risk—Why it Matters and Why it Isn’t Going Away

The more you rely on your vendors to do business, the more access they have to your organization and your data, the greater the risk they present to you.

image
Blog

Web Application Security 101

What is a Web Application Pen Test? In today's interconnected business world, web applications (web apps) are indispensable. Whether they are a client portal or online shopping site, attackers can...

image
Article

How to Become a Cyber Risk Specialist

Learn how to transition into a career in cyber risk in this episode featuring Ryan Wallace, a cyber risk analyst at HORNE Cyber. Ryan was a small business owner specializing in branding, graphic design and consulting before transitioning into cybersecurity.

image
Video

Cybersecurity & Third-Party Risk Management

Vendor management is one of the top security risks today. Here we dive into cybersecurity vendor risks: From your responsibilities to your vendors’, understanding roles and having accountability is crucial to maintaining your overall cybersecurity posture.

image
Video

The Importance of Third-Party Risk Management

At HORNE Cyber, we understand the third-party risk can be complicated to quantify and manage. That’s why we are here with the expertise and tools to help you manage your organization’s third-party risk. 

image
Blog

Impact and Mitigation of the KRACK WiFi Vulnerability

A vulnerability has been disclosed in the most popular and recommended security protocol for WiFi networks: WPA2. The weaknesses, discovered and documented by Mathy Vanhoef, may change the way your...

image
Blog

Is Your Google Chrome Browser Up-to-Date?

Late last week, Google announced an urgent Google Chrome browser update (78.0.3904.87) for Windows, Mac, and Linux platforms. The update includes security fixes for two identified vulnerabilities within the current...

image
Article

Work-from-Home Infrastructure Threatened by Cyber Threats | Opinion

Amid the rapid changes made to accommodate a new remote workforce, many organizations will fall victim to cyber-attacks.

image
Blog

Conducting Regular HIPAA Security Risk Analyses is Critical

Clients frequently ask the question, “How often should I perform a security risk analysis as a covered entity under HIPAA?” While the HIPAA security rule does not require a security...

image
In the News

HORNE Approved as a CMMC Third-Party Assessor Organization

Congratulations to HORNE Cyber on becoming an approved CMMC Third-Party Assessor Organization™ (C3PAO).

image
Video

[Webinar] Maximize Your COVID Relief

With all the regulatory changes around COVID relief, it's important to understand all of the available credits. In this live webinar, our Public & Middle Market team members discussed, PPP2 updates, Employee Retention Credit, tax changes and more.

image
Blog

Why "I'm Just Not Technical" is No Longer an Excuse in the C-Suite

I cannot tell you how many board presentations and meetings I have been in and heard "I am just not technical". Not being “tech savvy” is no longer a valid...

image
Blog

Don't Let Cyber Risk Derail Your M&A Deal

Headlines around hacking and data breaches have become a regular occurrence over the last few years. When a business loses the trust of its customers, it can be nearly impossible...

image
Blog

XaaS, Part 2: Infrastructure as a Service (IaaS)

Getting Started with IaaS As a businessperson, deciding whether to deploy an aspect of your business to the cloud can be an ordeal, especially if cloud computing discussions are not...

image
Blog

What would you do with a million dollars in a pandemic?

Over the past few months I’ve worked with multiple teams at HORNE as we’ve assisted State and Local Governments determine how to spend the funds provided to them through the...

image
Blog

3 Simple Ways to Test Your Business Continuity Disaster Recovery Plan

There are numerous resources that provide the means for developing a business continuity plan. These include the achievement of such activities as team formation, business impact analysis, evaluation of legal...

image
Blog

Pt. 5: 7 Tips for Achieving CMMC Level 4 Readiness

In our previous blog, we discussed the purpose of Level 3 and the requirements that potential contractors will need to meet to achieve Level 3 readiness. As we continue along...

image
Blog

Pt. 6: A Readiness Roadmap to the CMMC Level 5

In our previous blog, we discussed the purpose of Level 4 and the requirements that potential contractors will need to meet for Level 4. As we continue along the maturity...

image
Blog

COVID-19 Impacts on HIPAA: Maintaining Security and Privacy for Your Organization

COVID-19 has changed the HIPAA landscape in the short term, and some of these changes will undoubtedly echo long after the pandemic has ended. We’ve summarized the latest changes and...

image
Blog

Cloud Computing & Risk Management: A Review of the FFIEC's Recent Statement

Out of sight out of mind feels pretty good, doesn’t it? Especially with not only is it out of sight, it is off the ground. Your organization’s data is so...

image
Blog

A Tactical Crisis Response to Healthcare Cybersecurity

Introduction In May the Health Sector Coordinating Council (HSCC) and the Health Information Sharing and Analysis Center (H-ISAC) collectively created a tactical guide for how healthcare organizations can manage their...

image
Blog

6 Steps to NIST 800-171 Compliance

NIST 800-171 provides a framework for the protection of controlled, unclassified information (CUI). The framework is intended to provide guidance for nonfederal entities working with and accessing the data of...

image
Blog

Providing Peace of Mind Around Your Law Firm's Data Security

Have you ever wondered why Amazon Web Services (AWS) is so focused on security? When you visit their compliance page, they have nearly every privacy and security badge available, noted...

image
Blog

OCR Proposed Changes to HIPAA Privacy Rule Part 1

Introduction In January 2021, the Office of Civil Rights (OCR) published its proposed Modifications to the HIPAA Privacy Rule to Empower Individuals, Improve Coordinated Care, and Reduce Regulatory Burdens, and...