Created with Sketch.

Cybersecurity Resources

Take advantage of our resources, including case studies, news and expert thought leadership, to stay apprised of current cybersecurity trends.

To view the entire Our Thoughts On cybersecurity blog catalog visit our archive.

Category
Events
Webinar: How to Secure Student Records and Comply with GLBA
Quick References
Article - Security Info Watch - Lincoln College Closure a Testament to the Threat Posed by Ransomware

David Murphy在Security Info Watch关于林肯大学关闭的一篇文章中讨论了拥有一个好的灾难恢复计划和在漏洞管理工具上的投资的重要性.

Quick References
Article – Financial Planning –Remain on Alert for Russian Financial Cyber Attacks

David Murphy向Financial Planning提供了关于基本网络安全实践重要性的见解.

Quick References
Videos
Big Thinking, Personal Focus: Cybersecurity

Learn how big thinking and personal focus drive client success.

Service Overviews
IT Risk Advisory Overview
Quick References
Guide - CMMC Frequently Asked Questions

从授权资源和专业人士那里了解更多关于网络安全成熟度模型认证(CMMC)约定的常见问题.

Events
Webinar: How to Recover from a Cyberattack, presented by the Chronicle of Higher Education
White Papers
Securing a Remote Workforce

了解确保远程员工安全的最佳实践,包括关键基础设施考虑事项, cyber incident preparation and themed attack mitigation.

Quick References
Guide - CMMC Preparation Checklist

使用我们的准备清单,为您的网络安全成熟度模型认证(CMMC)参与做好更好的准备.

Service Overviews
Purple Team Assessment Overview
Quick References
Article - Tech Republic - Security alert: Use these most popular passwords at your peril

Cybersecurity Shareholder Carl Kriebel discusses how to strengthen password security with Tech Republic.

White Papers
Staying Secure From Home

了解组织和个人在日益遥远的世界中可以采取的减轻风险的最佳实践.

Quick References
Guide - Key Changes in PCI DSS V4.0

Learn about key changes in the Payment Card Industry Data Security Standard v4.0.

Quick References
Article – Pittsburgh Business Times Cyber-Breached Panel
Quick References
Article - Secrets Revealed: What Your Third Party Auditors Don’t Want You to Know

了解在与第三方IT审计人员合作以确保IT安全时应考虑的最重要事项.

Quick References
Guide - 7 Best Practices to Keep Your Home Network Safe

了解如何分层和维护防御安全措施,以保护您的资产免受数字入侵者.

Quick References
Infographic - Types of Personal Data

Learn about the different types of personal data targeted by cybercriminals.

Quick References
Article – Cybersecurity Dive – Banks Face 'Tight Deadline' Under New Cyber Notification Rule

大卫墨菲讨论了联邦存款保险公司的计算机安全事件通知最终规则与网络安全潜水.

Events
Webinar: Managing Cloud Vendor Risks
Service Overviews
Penetration Testing Overview
Quick References
Infographic – Top Ten Data Privacy Trends of 2021

了解为什么数据仍然是组织所拥有的最有价值和有针对性的资源之一,以及我们对保护数据的建议.

Quick References
Guide - 10 Must Ask Cybersecurity and Information Security Questions
Quick References
Infographic – The Most Common Passwords of 2022

View the top ten most commonly used passwords of 2022.

Quick References
Article – Directors & Boards – Boards and Management Must Work Together to Strengthen Cybersecurity

施耐德唐斯的卡尔•克里贝尔讨论了管理层和董事会弥合沟通差距以加强网络安全的重要性.

Quick References
Article – WAND – Ransomware, Pandemic Brought Down Lincoln College
Events
Webinar: Cyber Insurance: 2022 and Beyond
Our Thoughts On
A First of Its Kind: The $25 Million Deepfake Scam

Learn how scammers used a deepfake attack to steal more than $25 million from a multinational firm.

White Papers
10 Things Companies Wish They Did Before a Breach

Learn about ten key preventive measures companies have overlooked prior to a breach.

Case Studies
Global Manufacturer Operations Halted By Ransomware Attack
Quick References
Article – Pittsburgh Business Times – Remote Workforce Security Tips
Quick References
Article - The IT Nerd - Cyber Thieves Can Wreak Holiday Havoc: How to Avoid these Scams

网络安全股东卡尔·克里贝尔(Carl Kriebel)与IT Nerd讨论了今年针对在线假日购物者最常见的三种骗局.

Quick References
Article – CSO Online – What is Your Biggest Insider Threat?

David Murphy与CSO Online分享了他对一些最有问题的内部威胁和最小化风险的见解.

Quick References
Guide – Understanding the Security and Privacy Concerns of TikTok

Learn what data TikTok users share, 这些信息与谁共享,以及为什么许多人认为该平台存在安全风险.

White Papers
Top Ten Data Privacy Trends for 2021

Learn what the Top Ten Data Privacy Trends of 2021 are and what you should be doing to prepare.

Case Studies
Case Study: Company Impacted by Six-Figure Ransomware Attack
Quick References
Article - How Third Party Risk Management Caters to Your Organization

了解更多关于您的第三方风险管理团队每天为保证组织安全所做的工作.

Quick References
InfoSec Policy Templates
Quick References
Guide - COVID-19 Fraud Risks
Videos
Chronicles of a Penetration Tester

Lead Cybersecurity Strategist Stephen Bish shares his adventures as a penetration tester.

Events
Webinar: 10 Vulnerabilities Hackers Love to Exploit
White Papers
10 Most Common Physical Cybersecurity Threats

了解组织面临的一些顶级物理网络安全威胁以及减轻物理安全风险的最佳实践.

Quick References
Infographic – 10 Steps Contractors Can Take to Reduce Cyber Attacks

Learn ten key steps contractors can take to strengthen their cybersecurity defenses.

Our Thoughts On
Fortifying Retail Security: Essential Cybersecurity Tools and Software

探索对零售业安全至关重要的网络安全工具和软件

Quick References
Guide – Compliance and Third Party Risk Management
Quick References
Article - Pittsburgh Post Gazette - Ask Me About... How the Shutdown of a Small College Brings Home the Danger of Ransomware

大卫·墨菲接受《bet9平台游戏》采访时谈到了最近导致林肯学院关闭的勒索软件攻击事件.

Videos
Top Cybersecurity Questions of 2021

加入施耐德唐斯网络安全团队,从2021年开始,他们将回答在该领域面临的一些最常见的问题.

Quick References
Infographic - Top Disguises Used to Breach the Office
Service Overviews
Third Party Risk Management Services Overview
Service Overviews
CMMC Service Overview
Our Thoughts On
Tis the Season: Unwrapping the Top Holiday Scams of 2023

Learn about some of the top online scams circulating this holiday season.

White Papers
Top Ten Cybersecurity Strategy Mistakes of 2021

了解我们团队亲眼目睹的顶级网络安全战略错误,以及避免这些常见陷阱的最佳实践.

Service Overviews
Cybersecurity Services Overview
Service Overviews
Ransomware Security Overview
Service Overviews
PCI DSS Service Overview
Our Thoughts On
Postcard from the 2023 ISACA Pittsburgh Information Security Awareness Day

探索2023 ISACA匹兹堡信息安全意识日会议的一些关键要点.

Videos
Cybersecurity Tips from Home Series
Quick References
Article – CNN – US Warns Businesses to Prepare for Russian Cyberattacks. Here's How They Can Do That

Schneider Downs' David Murphy discusses cyber insurance and potential Russian cyberattacks.

Our Thoughts On
Defend Your Dollars and Data: How to Avoid IRS Impersonation Scams

Learn more about how to identify and avoid IRS impersonation scams this tax season.

Quick References
Guide - Automotive Dealerships and the FTC Safeguards Rule

了解更新后的联邦贸易委员会对汽车经销商的保障规则概述的新的合规要求.

Events
Webinar: Inside Web Application Penetration Testing
Case Studies
Employees’ Passwords Compromise Cybersecurity Defenses
Videos
Why IT compliance strengthens and protects your business

Manager of Risk Advisory Services, Timothy Wolfgang, joins the PGH Networks to discuss why IT compliance strengthens and protects your business.

Quick References
Article – Schneider Downs Named PTC Tech 50 Cybersecurity Innovator of the Year
Quick References
Article - The Top Ten Most Common SOC 2 Exceptions

Learn about the most common SOC 2 exceptions the Schneider Downs team have encountered.

White Papers
Benefits of a Purple Team Assessment

了解更多关于使用Purple Team评估扩展基本渗透测试的好处,以帮助您改进组织的警报和检测状态.

Quick References
Article – HowStuffWorks – Have You Been Zoom Bombed?
Our Thoughts On
10 Cybersecurity New Year's Resolutions for 2024

根据施耐德唐斯网络安全团队提供的以下十条建议,在2024年加强您的网络安全防御.

Videos
Top Cybersecurity Questions of 2022

施耐德唐斯网络安全团队分享了他们在2022年从客户那里面临的一些首要问题.

Quick References
Article – WAND – Ransomware, Pandemic Brought Down Lincoln College

Sean Thomas discusses the role a ransomware attack played in the permanent closure of Lincoln College.

Quick References
Infographic – Avoiding COVID-19 Scams
Quick References
Article – VentureBeat – Why the U.S. Can Engage Russia on Cyber Over Ukraine

施耐德唐斯的大卫·墨菲就乌克兰问题如何影响美俄关系提供了见解.

Quick References
Article - Proposed Interagency Guidance on Third-Party Risk Management

Learn about the new jointly proposed guidance on Third Party Risk Management from the OCC, FDIC and Board of Governors of the Federal Reserve System.

Quick References
Article – Pittsburgh Business Times – Carl Kriebel Joins Schneider Downs

Carl Kriebel joined Schneider Downs & Co. Inc. as a shareholder and is based at its downtown headquarters.

Our Thoughts On
Squish the Quish – Stop and Think Before You Access a QR Code

Learn more about QR code phishing attacks and how to protect yourself from this rising threat.

White Papers
Maximizing the Value of Penetration Testing

Learn about penetration testing including our methodologies, and best practices to help your organization maximize the value of this assessment tool.

Quick References
Article – S&P Global – Small Banks Could Face Challenges With 36-Hour Cyber Reporting Rule

David Murphy discusses why smaller banks may struggle with the FDIC 26-hour cyber reporting rule.

Service Overviews
Digital Forensics & Incident Response Overview
Quick References
Article - Government Technology - Cyber Analyst Q&A: Security Lessons from Lincoln College

David Murphy discusses cyber attack vulnerabilities and what colleges can do to mitigate them.

Our Thoughts On
Ensuring Network Security in the Retail Industry: A Crucial Imperative

了解零售行业对强大网络安全的更多需求,并发现增强网络安全的有效策略.

Quick References
Article - Shared Assessment SIG Questionnaire – What’s New for 2023?

了解共享评估2023标准化信息收集(SIG)问卷的一些关键变化.

Quick References
Article – Search Security – Cyber Insurance Premiums Skyrocket

Schneider Downs' Stephen Bish discusses Cyber insurance premiums with TechTarget, as costs skyrocket due to attacks surge.

White Papers
10 Vulnerabilities Hackers Love to Exploit

深入了解黑客的思想,了解导致违规的潜在情况以及减轻这些风险的最佳实践.

Quick References
Guide – Qualifying for Cyber Insurance in 2022

Learn about key requirements and considerations to qualify for cyber insurance.

Our Thoughts On
Comcast Xfinity Breach Impacts Nearly 36 Million Customers

Learn more about the Comcast Xfinity breach that exposed login credentials of 35.8 million customers.

Quick References
Article - WTAE-TV ABC 4 - How to protect yourself from online shopping scams

网络安全股东卡尔·克里贝尔坐下来与匹兹堡WTAE-ABC讨论了一些最流行的针对假日购物者的骗局,以及如何避免它们.

Events
Webinar: Benefits of a Purple Team Assessment
White Papers
Cybersecurity Maturity Model Certification (CMMC) Guide

Learn about CMMC, including a deep-dive into the certificate framework, the certification process, potential costs and best practices for preparing your organization.

Breached?

Every moment counts. For urgent requests, contact the Schneider Downs digital forensics and incident response team at 1-800-993-8937. For all other requests, please complete the form below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.