Cybersecurity

New York Instates First Mandated Cybersecurity Law

Due to the increasingly significant threat of cybercrime on businesses and consumers, New York has released cybersecurity requirements for financial services companies in the state of New York. While the SEC currently mandates that organizations need to implement “reasonable safeguards to protect a client’s nonpublic information,” the new law provides more clarity for organizations to […]

Read More

Outline of Guidance for PCI DSS Scoping and Network Segmentation

In order to clarify scoping and network segmentation principles in PCI DSS, the PCI SSC has released additional guidance in order to help organizations identify what systems are considered in scope for PCI DSS assessments. This guidance was developed by industry experts and the PCI SSC Board of Advisors in order to assist organizations in […]

Read More

[Webinar] Scammed: Defend Against Social Engineering Attacks

Social Engineering Webinar A-LIGN, a nationwide security and compliance solutions firm, is committed to combatting cyberattacks that utilize social engineering. On March 1, A-LIGN Partner, Gene Geiger, will host a social engineering webinar called Scammed: Defend Against Social Engineering that will educate organizations on how to protect their employees and assets from social engineering attacks. […]

Read More

Phishing 201: What are the Different Types of Phishing Attacks?

In our initial blog, Phishing 101, we covered the basics of phishing, including what phishing is and how to prevent it. Today, we will cover the different types of phishing attacks that your organization could be vulnerable to. Types of Phishing Deceptive phishing Deceptive phishing is the most common type of phishing scam. These scams occur […]

Read More

Social Engineering 101: What is Phishing and How do I Prevent It?

What is Phishing? Phishing is a series of communications that are sent in order to deceive individuals to provide sensitive information. Phishing can take the form of email messages, website forms, or phone calls and can be designed to reveal different information.  This information can take the form of: Credit card or other financial information […]

Read More

3 Security Trends that will Continue in 2017

With the ushering in of another new year, I find myself acting nostalgic, wondering where the previous year went and of course pondering the year ahead. Here are three security and commerce trends which will continue in 2017. Healthcare Data Breach According to the Privacy Rights Clearinghouse, healthcare data breaches in 2016 comprised of 290 […]

Read More

10 Ways to Protect Your Information When Shopping Online

When the holiday season comes around, everyone is in the spirit of giving back and joining in on the festivities. This usually spurs an increase in spending and holiday shopping, most of which happens online. According to comScore and UPS’ online shopping survey, shoppers are now making 51% of their purchases online with 44% of […]

Read More

5 Tips to Enhance Your Password Security

iso-27001-blue

A password is designed to protect our personal information and accounts, but how are the passwords that you are using making it easier for hackers to access your accounts? Our experts have analyzed numerous passwords and why they don’t fit the security criteria. Here are some actionable tips for you to easily increase the security […]

Read More

Vulnerability Scan vs. Penetration Test: What’s the Difference?

What is the difference between a penetration test and a vulnerability scan? Is a penetration test a vulnerability assessment? Is a vulnerability scan a penetration test? Which one does my organization need? As organizations prepare to meet their security needs, determining which service your organization requires depends on the purpose of each project. Vulnerability Scan […]

Read More

The Trail to Breach Prevention: Infographic

The importance of National Cyber Security Awareness Month cannot be understated. A-LIGN has highlighted statistics from the breaches that occurred in 2015 in order to portray the prevalence and potential cost of data breaches. In order to help your organization refrain from becoming another statistic, A-LIGN has provided actionable steps that your organization can take […]

Read More