Main Menu
  • Filter:
image
Blog

Top 5 Tips for Secure Holiday Shopping

The holiday season is once again upon us. While there has been much discussion of supply shortages, shipping delays, and inflation, we are here to keep cybersecurity top of mind...

image
Blog

CMMC 2.0 - Major Changes for Contractors

Earlier this week, the Department of Defense and CMMC Accreditation Body released proposed changes to the CMMC implementation following a six-month review aimed at clarifying the standard, lowering the financial...

image
Blog

Prioritizing Cybersecurity in a Hybrid Workplace

In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home...

image
Blog

#CyberCareerWeek: HORNE Cyber's Women in Tech

In honor of Cyber Career Awareness Week, HORNE Cyber is proud to introduce a few of our women in tech. Our team shares advice and encouragement for those aspiring to...

image
Blog

Why You Should Consider a Cyber Career

Cybersecurity is a rapidly developing field with new threats and challenges appearing every day. To stay ahead of active threats, both business and education sectors are putting forth a concerted...

image
Blog

Fight the Phish with Brad Pierce | HORNE Cyber

This week, we sat down with our Director of Security Operations, Brad Pierce, to get his thoughts on phishing attacks. Below we discuss best practices to fight the phish, phishing...

image
Blog

3 Fundamentals for Shoring Up Phishing Defenses

From ransomware to SolarWinds, the cybersecurity space has been as fast-paced as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping...

image
Blog

Cyber Basics with Mike Skinner

This week, we sat down with our managing partner, Mike Skinner, to get his opinion on basic cyber hygiene when it comes to protecting yourself while on the internet. Below...

image
Blog

Get Familiar with the Cyber Basics

At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks...

image
Blog

How Do You Manage Ransomware Risk?

Ransomware has become an all-too-common occurrence in today's digital world. With threat actors constantly evolving their tactics and developing new threats, protecting your organization against ransomware attacks can be difficult. However, following these 5 best practices can minimize your risk:...

image
Blog

What to Know About Cybersecurity For Your Home & Family

Internet is an integral aspect of modern life. One that has brought us many conveniences and transformed businesses and human connection. However, this world of connection has brought many challenges...

image
Blog

What is the number one way to prevent shadow IT?

Shadow IT continues to be prevalent in many organizations, bringing unknown and unmitigated risks into your environment. Several factors have accelerated the presence of shadow IT in recent years, such...

image
Video

Part 3: Why Isn't Vendor Risk Going Away?

Vendor risk management should be a key part of your organization's cyber risk management program, especially if you rely on third-party providers.

image
Video

Part 2: Why Does Vendor Risk Matter?

Cyber risk increases when companies outsource their critical business operations to third parties, so vendor risk management should be a key part of your organization's risk management program.

image
Video

Part 1: What is Third Party Risk Management?

Third-party risk management programs oversee three main areas of your vendor lifecycle: due diligence with policy and procedures, the monitoring process and vendor termination.

image
Whitepaper

Third-Party Risk—Why it Matters and Why it Isn’t Going Away

The more you rely on your vendors to do business, the more access they have to your organization and your data, the greater the risk they present to you.

image
Blog

Web Application Security 101

What is a Web Application Pen Test? In today's interconnected business world, web applications (web apps) are indispensable. Whether they are a client portal or online shopping site, attackers can...

image
Article

How to Become a Cyber Risk Specialist

Learn how to transition into a career in cyber risk in this episode featuring Ryan Wallace, a cyber risk analyst at HORNE Cyber. Ryan was a small business owner specializing in branding, graphic design and consulting before transitioning into cybersecurity.

image
Video

Cybersecurity & Third-Party Risk Management

Vendor management is one of the top security risks today. Here we dive into cybersecurity vendor risks: From your responsibilities to your vendors’, understanding roles and having accountability is crucial to maintaining your overall cybersecurity posture.

image
Video

The Importance of Third-Party Risk Management

At HORNE Cyber, we understand the third-party risk can be complicated to quantify and manage. That’s why we are here with the expertise and tools to help you manage your organization’s third-party risk. 

image
Blog

Impact and Mitigation of the KRACK WiFi Vulnerability

A vulnerability has been disclosed in the most popular and recommended security protocol for WiFi networks: WPA2. The weaknesses, discovered and documented by Mathy Vanhoef, may change the way your...

image
Blog

Is Your Google Chrome Browser Up-to-Date?

Late last week, Google announced an urgent Google Chrome browser update (78.0.3904.87) for Windows, Mac, and Linux platforms. The update includes security fixes for two identified vulnerabilities within the current...

image
Article

Work-from-Home Infrastructure Threatened by Cyber Threats | Opinion

Amid the rapid changes made to accommodate a new remote workforce, many organizations will fall victim to cyber-attacks.

image
Blog

Conducting Regular HIPAA Security Risk Analyses is Critical

Clients frequently ask the question, “How often should I perform a security risk analysis as a covered entity under HIPAA?” While the HIPAA security rule does not require a security...

image
In the News

HORNE Approved as a CMMC Third-Party Assessor Organization

Congratulations to HORNE Cyber on becoming an approved CMMC Third-Party Assessor Organization™ (C3PAO).

image
Video

[Webinar] Maximize Your COVID Relief

With all the regulatory changes around COVID relief, it's important to understand all of the available credits. In this live webinar, our Public & Middle Market team members discussed, PPP2 updates, Employee Retention Credit, tax changes and more.

image
Blog

Why "I'm Just Not Technical" is No Longer an Excuse in the C-Suite

I cannot tell you how many board presentations and meetings I have been in and heard "I am just not technical". Not being “tech savvy” is no longer a valid...

image
Blog

Don't Let Cyber Risk Derail Your M&A Deal

Headlines around hacking and data breaches have become a regular occurrence over the last few years. When a business loses the trust of its customers, it can be nearly impossible...

image
Blog

XaaS, Part 2: Infrastructure as a Service (IaaS)

Getting Started with IaaS As a businessperson, deciding whether to deploy an aspect of your business to the cloud can be an ordeal, especially if cloud computing discussions are not...

image
Blog

What would you do with a million dollars in a pandemic?

Over the past few months I’ve worked with multiple teams at HORNE as we’ve assisted State and Local Governments determine how to spend the funds provided to them through the...