Marketing and Cybersecurity – Protecting Against Breaches

Marketing people have access to a lot of customer data – and that makes them prime targets for data breaches – Mark Janowicz talks to Ben Thurston about what marketing professional needs to know about cybersecurity. In this second of six video blogs, CTI’s Ben Thurston explains that not all data are treated equally and

Marketing Analytics and Cybersecurity

Cybersecurity and marketing analytics go hand-in-hand because at the end of the day it’s still about keeping data about your customer and prospects safe and out of the hands of cyber criminals.  You certainly do not want the theft of sensitive information to be the next news headline! In this first of six video blogs,

The Equifax Hack – The Ingredients for Misery

On Sept 7, 2017, Equifax announced they were hacked sometime between May and July of this year. The incident potentially impacts around 143 million U.S. consumers, exposing names, Social Security numbers, birth dates and more. All the ingredients identity thieves need to cook up some misery. Obviously, we all have reason to be concerned by this breach

Are You and Your Data Ready for NYCRR 500 Regulations

n March 1st, 2017, the New York State Department of Financial Services put into effect new cyber security requirements of its ‘covered entities’. Those entities include banks, trusts, budget planners, check cashers, credit unions, money transmitters, licensed lenders, mortgage brokers or bankers, and insurance companies that do business in New York. Here is a quick

Triangulating and closing security compromises

But the CEO told me to wire $60K to the Caymans! We’ve seen a recent rash of e-mail exploits that blend “social engineering” with e-mail technology. These exploits use e-mail to impersonate respected leaders and authorities of an enterprise giving direction to subordinates or delivering malware payloads and links in what looks like a trusted

How to Value the Cost of a Data Breach

As the Founder and CEO of a technology consulting firm, there are many proprietary data concerns that we must consider and protect, not the least of which is our client information. While our firm, Corporate Technologies, Inc (CTI). may not be directly subject to data security regulations, providing services to many of our clients obligates

There is no immunity from cyber attacks, so be prepared

Threat Assessment

Devastating cases of cyber-attack scenarios continue to mount. Unfortunately,  the most recent high-profile example is a harbinger of things to come.  By now, everyone is at least peripherally aware of the WannaCry ransomware attack that occurred just a few weeks ago.  If you somehow missed it, the WannaCry ransomware attack was a worldwide exploit by

Why You Should Adopt a Cybersecurity Framework

A Primer on the NIST Cybersecurity Framework Adverse security events make the news daily; from compromised personal information to ransomware.  The IoT (Internet of Things) has opened up all kinds of new possibilities for the bad guys.   These internet-connected devices that we bring into our homes / businesses are being exploited.[1] Is your organization prepared


© Corporate Technologies, Inc.   |  Privacy & Legal