HORNE’s cyber team recently earned The Cyber AB Certified Third-Party Assessor Organization (C3PAO) designation which allows HORNE to perform specific cyber security assessments for Organizations Seeking Compliance (OSC) through contractual agreements.
In most companies, developers are focused on meeting project deadlines, and that often leads to applications that are insecurely coded. Custom development can multiply vulnerabilities. Some 48 percent of developers think they leave vulnerabilities in their code, according to the State of Developer-Driven Security Survey 2022 from Secure Code Warrior.
One of the biggest threats facing organizations related to cybersecurity involves web application security. Organizations continue to use custom-developed and off-the-shelf web applications, and they present significant cyber risk because of the vulnerabilities that are typically in them.
Government contractors must comply with the new Cybersecurity Maturity Model Certification (CMMC) program from the Department of Defense (DoD) and its standards to maintain existing contracts and win new ones.
Cybersecurity and cyber insurance are a priority in today’s world, but in the past few years, these issues have become even more important for companies with employees working remotely. Working from home has multiplied the risks and occurrences of data breaches, and breach costs also have grown.
Cybersecurity risks challenge your business development. You need to address the bad risks so you can take the good risks that let you grow and maneuver to stay ahead of your competition. You also need expert insights into cyber risk and how you must defend your organization and protect your growth.
Automobile dealers don’t just sell vehicles, they do credit checks and issue loans as well. Because of this, dealers store important customer data, such as addresses, social security numbers and other personal identifiable information.
Internet is an integral aspect of modern life. One that has brought us many conveniences and transformed businesses and human connection. However, this world of connection has brought many challenges and risks to our doorstep. Over the last year and a half, we have seen our homes become centers not only for leisure online activities such as social media, personal banking, gaming, and TV streaming, but also virtual schools and offices.
In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the number of installed connected devices in the home is expected to rise by a staggering 70% by 2025.
Sarah Duncan is a manager in the cyber practice at HORNE where she serves as an account executive. She specializes in assisting and educating clients on proactive cyber services that help secure their organizations, minimize risk, and fulfill compliance responsibilities.
Brad serves as the Chief Information Security Officer for HORNE where he leads cyber security programs and initiatives for the firm. He manages offensive cyber security operations for HORNE and its clients, where he leads on collaborating with executive leadership teams to strengthen their security posture.
Increased use of telemedicine puts many long-term care facilities at risk, and cyber-criminals are already targeting healthcare organizations which can adversely impact health information technology, medical communications, and patient and resident safety. Ryan Wallace from HORNE Cyber joins us on this episode to share 5 best practices to help keep your network secure.
In this episode, Brad Pierce of HORNE Cyber talks about how the majority of business owners who have invested in their cybersecurity posture still have a false sense of security. Listen to learn about how you can best protect your organization.
On Friday, November 20, the U.S. Department of Health and Human Services (HHS) published the long-awaited final rules revising regulations related to the Physician Self-Referral Law (known commonly as the Stark Law), the Anti-Kickback Statute (AKS), and the Civil Monetary Penalty Law (CMP).
It has come to our attention that a new email phishing or “spoofing” scheme is being sent to businesses seeking financial assistance due to COVID-19. The emails are an attempt to scam business owners that have applied, or are considering applying, for Paycheck Protection Program loans backed by the U.S. Small Business Administration. These emails may look legitimate and appear to come from your bank.
Manage Cookie Consent
This website stores cookies on your computer. We use this information to improve and customize your browsing experience and for analytics and metrics about our visitors.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.