Also: Log4J Global Ripple Effects, Ensuring Actionable Risk Assessment Results, Software Patch Management, and more!
Top Threats of 2022 Webinar
Cybercriminals are taking hacking to the next level in 2022, leveraging ever more sophisticated toolsets and rapidly evolving techniques. Join LMG’s Sherri Davidoff and Matt Durrin on 1/25 to hear their predications for the top threats of the year and strategies to protect your organization.
Wall Street Journal: New Log4J Flaw Caps Year of Relentless Cybersecurity Crises
Our CEO Sherri Davidoff discusses the Log4j exploit and related supply chain risks with the Wall Street Journal. “When there’s a risk in one part of the system, it has the potential for a global ripple effect.”
The Log4Shell Exploit Has Over 60 Mutations—Learn What to Do Next
As expected, the Log4Shell Exploit is impacting a staggering numbers of organizations, systems and services. Our blog takes a deeper look at the Log4Shell exploit, discusses patch and mitigation tips, and shares how to reduce your risk of an attack through one of your suppliers or partners.
How to Ensure Your Cybersecurity Risk Assessment Results are Actionable
The key to optimizing your results from a risk assessment is planning. Our Chief Strategy Officer Madison Iler shares how to plan your cyber risk assessment to ensure the output provides actionable results that support your risk reduction goals.
6 Software Patch Management Policy Mistakes (and How to Fix Them)
Hackers spent 2021 wreaking havoc by exploiting software vulnerabilities, so now is a great time to check when you last updated your organization’s patch management policy. Read our blog for common mistakes and solutions.
What Hackers Do with Stolen Data & How to Reduce Your Risk After Data is Taken
After a data breach, attackers often leverage stolen data to commit more crimes. Our blog discusses what hackers do with stolen data, and provide practical tips for reducing risk when—not if—sensitive information is leaked to the world.
Insider Threat Management: How to Reduce the Risks From Within Your Organization
The insider threat is one of the most challenging cybersecurity risks for organizations. It’s hard to think that one of your team members could be part of a cyberattack, but it does happen. Read our blog to learn how to reduce your risk.
Thank you for your interest in LMG Security! We are here to support your cybersecurity needs with technical testing, compliance consulting, digital forensics and cybersecurity training. Please don’t hesitate to contact us with any questions.