The Dataprise Blog

Basel Committee Sets Banking Cybersecurity Expectations in New Operational Resilience Report

Apr 08, 2021 BY Mary Beth Hamilton
Want the latest IT insights? SUBSCRIBE

Information Security

Basel Committee Sets Banking Cybersecurity Expectations in New Operational Resilience Report

Dataprise analyzes Principle 7, a recommendation by the Basel Committee on Banking Supervision to strengthen banks' ability to withstand operational risk-related events.
Information Security

MSP Breach Puts Ransomware in Spotlight: Here’s 6 Ransomware Threats and Tips to Mitigate Risk

We share six tips from one of Dataprise’s security pros on typical ransomware attacks and baseline actions to mitigate risk.
Information Security

Not All Two-Factor Authentication Methods Are Created Equal

With a seemingly unending list of high-profile data breaches in recent news, many organizations are reevaluating their security posture and seeking additional protection. In times like this, reexamining the fundamentals of your security posture is just as important as adopting new developments in the industry. Today, we want to discuss one of the most important of those fundamentals: two-factor authentication (2FA).
Information Security

Remote Access Technology and You: A Guide for the SMB

Organizations are turning to remote access technology to ensure business operations can continue away from the office. In this article, we examine the common toolsets used for remote access and how they can work best for you and your company.
Information Security

Improving Security with Multifactor Authentication

Sometimes it feels like a hassle to have to do two-step authentication for email and application security. This blog explains the importance of this extra step to maintain a secure environment.
Information Security

Navigating the Maze Behind Ransomware

In this blog article, we help you navigate and better understand what goes into a ransomware attack.! Click here to learn how to protect against ransomware.
Information Security

The Digital Frontier: How to Protect Your Ranch

With an increase in ransomware attacks on businesses, defending your network is crucial. Learn how to protect your security environment in this article.
Information Security

Cyber Hygiene: Address the Little Stuff to Stop Big Problems

Just like brushing your teeth can prevent cavities, there are small steps you can consistently take to prevent cyberattacks on your business. Learn what they are in this blog.
Information Security

The Threat Down the Hall

What are insider threats, and how can you prevent them? Find out in this information security blog.
Information Security

Business Email Compromise: A Growing Threat

Business Email Compromise attacks are sophisticated, targeted schemes that have the potential to cause massive damage to your organization. Read the blog to learn more.
Information Security