Education Center

Why is Cybersecurity A Business Problem?

Many business leaders don’t have a strong technical background. Helping them understand their role in managing cybersecurity is my personal mission….

GDPR: Protecting Personal Data in the EU and Beyond

When the story broke that the personal data of millions of Facebook users was mined by Cambridge Analytica, people were shocked…

New Guidelines from the SEC Improve Cyber Risk Disclosures

In February of 2018, the Securities and Exchange Commission (SEC) updated its guidance statement on cybersecurity, expanding the scope of the…

Triad Cyber Round Table: Bringing Together Experts to Improve Cybersecurity Education

Since its founding, Threat Sketch has developed its products and educational resources for business executives with the overarching idea that cybersecurity…

Password Managers – Should You Use Them?

The high number of sites that are password protected coupled with suggested best practices for password strength makes it incredibly difficult…

A Brief History of Information Warfare

The article linked below, written by a distant relative of mine, outlines the historical precedence for today’s modern cyber warfare. The…

Cybersecurity for Small Businesses: An Overview of Issues

Don Mazzella, COO and Editorial Director of Information Strategies, Inc., and Dan Perkins, registered investment advisor, both have years of experience…

Is Online Banking Safe?

Yes. So long as you use 2-factor authentication, don’t do it on shared devices (library, computer lab, or a friends computer/phone/tablet)…

KRACK WiFi Hack – How To Protect Your Business

US-CERT is poised to announce the discovery of a new way hackers can bypass basic security measures in Wi-Fi (a.k.a. wireless)…

3 Minute Summary of the BBB’s 2017 State of Cybersecurity Report

The newly released 2017 State of Cybersecurity Among Small Businesses in North America is a 24 page summary of an extensive…

Equifax: 5 Tips for Victims and What Employers Everywhere Need to Know

The Equifax breach, which is still under investigation, has left the nation reeling. Here at Threat Sketch, our heart goes out…

The True Cost of Missing Hardware: Protecting Yourself From Theft & Loss

While many small business owners are concerned with data loss through cyber attacks such as malware and hacks, physical hardware theft…

Denial of Service- When Your Website is Under Attack

Data shows that more than half of all small businesses have websites, which they use to advertise services, offer information to…

Card Skimming & Small Businesses: Protecting Cash Machines from Hackers

Cash machines, like registers and ATMs, are a vital part of nearly any business, but they are also vulnerable to physical…

Beyond Phishing and Malware: The Top 5 Other Cyber Attack Patterns

Millions of small businesses are attacked by hackers every year. In fact, 43% of all cyber attacks are directed at small…

Preventing Accidental Exposure – Your Guide to Minimizing Human Error to Improve Cybersecurity

As a business owner, you are probably hyper aware of the costs of human error. It can affect your profit margin,…

4 Steps to Protect your Company from Abuse of Trust Attacks

When you download an app, use a website, hire an employee, or install software, you implicitly express your trust in that…

WannaCry Ransomware Attack

WannaCry Ransomware Attack [Updated: 7:15am 5/16/2017 - Phishing was reported as the initial vector, but that may not be true.] [Updated: 3:45pm...

Cyber Espionage – Small Businesses are Prime Targets

Cyber espionage is one of the most pressing cybersecurity risks for small businesses. These attacks are designed to steal data, but…

Six Ways to Spot a Fake Ransomware Demand

Undoubtedly, one of the most pernicious of the current crop of cybercrimes is ransomware.  Unlike many stealth-based approaches to profiting off system intrusion,…

IoT Presents Cybersecurity Risks to Your Network

If you think that everything is connected to the internet, you wouldn’t be too far off on your assumption. The Internet…

The Most Important Security Questions To Ask Your Hosting Provider

Investing in security is like building a fortress to block a castle from outside invaders. The more you take precautions to…

Point of Sale Hacking and What it Means for Small Businesses

While many business owners purchase point of sale machines with the belief that they are secure, this is often far from…

5 Minute Briefing: Website Attacks and Your Small Business

As a small business owner, website hacks are likely the furthest thing from your mind, but they are a risk you…

Ransomware: What a Small Businesses Owner Needs to Know

Did you know that the data you use to keep your business running smoothly could put you at risk for a…

Damage Control: Communicating with and Protecting Victims after a Cyber Attack

“I’ve been hacked. Now what do I do?” Unfortunately, this is a question that too many small business owners and executives…

Chip Card Technology: A Small Business Perspective

In October 2015, U.S. banks began integrating EMV, or Chip cards, into the credit/debit card system. EMV, or “Europay, MasterCard, Visa,”…

Social Engineering: The Fastest Growing Threat to Business

A 2015 PwC study found that more than half of global organizations offer some type of cybersecurity awareness training for their…

Your Biggest Security Threat Might be Right Under Your Nose

When an organization is hacked, fingers immediately point to the actors who planted the malware and have something to gain from…

Ransomware and Crimeware: A Troubling Evolution of Malware

As a small business owner, having a web presence is vital to growing your bottom line. Unfortunately, with a connection to…

What You Need to Know about Mobile Malware Threats

Today’s mobile cybersecurity faces growing threats, an increasing complexity of devices, and more intelligent malware threats attacking devices, apps, and networks….

Distributed Denial of Service (DDoS) Cyber Attacks Grow Bigger & Bolder

Distributed Denial of Service (DDoS) attacks are one of the leading threats to cybersecurity. This type of attack occurs when a…

What is Encryption? The Technology that Keeps Your Business Data Safe

Cybersecurity is an increasingly important consideration for businesses of all sizes. With strings of high-profile hacks on companies including Home Depot,…

The Current Cybersecurity Landscape & What You Need To Know

A look at today’s cybersecurity landscape The cybersecurity landscape has a good news/bad news outlook. The good news, according to new…

Why You Need Cybersecurity Insurance

Getting the Most from Cybersecurity Insurance We all hope that we never have a security breach in our company. But the…

Making the Case for Encryption

The Role of Encryption Encryption is one of the primary tools available to keep an organization’s data and communications confidential. It…

Cybersecurity – Not Just For Cyber-Focused Companies

Cybersecurity is important for all businesses. You hear the terms cybersecurity and cyber attacks more and more lately, and reports of…

Two-Factor Authentication the Easy Way to Heighten Your Cybersecurity

There was a time when a moderately complex password was enough to provide security from most cyber attacks. Unfortunately, that’s no…

Cybersecurity- It’s More than just IT

As IT professionals, we often feel that the entire weight of cybersecurity rests upon our shoulders. Despite all our effort and…

3 Types Of Cybersecurity Assessments

A Cybersecurity Risk Assessment is a strategic tool that aligns a company’s priorities and budgets within the organization’s high-level threat landscape….

Your Company’s Cybersecurity: The Time to Act is Now

It is common for small business owners and executives to adopt a “wait and see” stance toward investing in cybersecurity. After…

Keep Cyber Attacks from Killing your Brand

Reputation matters. We’ve all heard the Warren Buffett quote a millions times, “It takes 20 years to build a reputation and…