2020 Phishing Benchmark Global Report

Anyone working in cybersecurity, technology, or business leadership roles knows that the stakes around safeguarding confidential data have never been higher. Many organizations are shifting how they work, with remote work and other considerations lessening the impact of your average technical safety nets.

Email Phishing Simulation – What Not To Do

A British railway firm has been criticized (and rightly so) for sending out an email phishing simulation test that ended up eroding employee trust in the company.

The firm sent out an email phishing simulation to employees telling them that would get a financial reward for their "hard work" during the pandemic.

5 Top Cybersecurity Threats: Attacks on Connected Medical Devices

Our last focus in this series, based on the recent campaign from HHS' 405(d) Task Group is Attacks on Connected Medical Devices. The information on these flyers we are sharing with you was pulled directly from the Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP) publication.

5 Top Cybersecurity Threats: Insider, Accidental or Intentional Data Loss

As we mentioned in our first blog post of this series, HHS' 405(d) Task Group, with which Fulcrum Group is associated, has detailed and created flyers for 5 Top Cybersecurity Threats and we're sharing them with you throughout this month, along with great tips on how to mitigate!  Although these particular tips and flyers are geared around a healthcare environment, the recommendations and security strategies mentioned fall under standard cybersecurity best practices for any organization.

April 13, 2021 is Identity Management Day!

Recent research reveals that 79% of organizations have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the 2020 Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches leverage weak, stolen, or otherwise compromised passwords.

5 Top Cybersecurity Threats: Ransomware Attacks

As we mentioned in our first blog post of this series, HHS' 405(d) Task Group, with which Fulcrum Group is associated, has detailed and created flyers for 5 Top Cybersecurity Threats and we're sharing them with you throughout this month, along with great tips on how to mitigate!  Although these particular tips and flyers are geared around a healthcare environment, the recommendations and security strategies mentioned fall under standard cybersecurity best practices for any organization.

5 Top Cybersecurity Threats: Email Phishing Attacks

March 31st, 2021

The HHS' 405(d) Task Group, with which Fulcrum Group is associated, was created to enhance cybersecurity and align industry approaches by developing a common set of voluntary, consensus-based, and industry-led guidelines, practices, methodologies, procedures, and processes that healthcare organizations can use to enhance cybersecurity.

Business & IT Lessons From The Covid-19 Pandemic

January 22nd, 2021

It’s safe to say that no business owner was totally prepared for the massive impact of Covid-19 on a wide range of business functions. It has now been almost a year since the pandemic caused businesses to lock down and send employees to work from home.

Ransomware – Before, During & After

January 14th, 2021

Before During and After Ransomware attacks

We all have heard of one of the most popular cyberattacks used in today’s business environment – ransomware. What type of attack it is, how it is obtained, how to get it off your machines if you’re attacked, and how to prevent it from happening to your organization – we’ve got answers for you! Watch our quick video here, or see our Q & A below.