NEXUS CYBER
  • Pen Testing
    • External Pen Test
    • Internal Pen Test
    • Firewall Pen Test
    • Web App Pen Test
    • Wireless Pen Test
    • Physical Pen Test
    • SCADA Pen Test
    • Social Engineering
    • Cloud Pen Test
  • Security
    • Managed Security Services
    • Virtual CISO
    • Security Training and Awareness
  • GRC
    • Cybersecurity Assessment
    • Cybersecurity Risk Management Program
    • Information Security Policies and Plans
    • Regulatory Compliance
    • Third-Party Risk Management
  • IR
    • Incident Response and Management
    • Cyber Investigation
  • Reputation Mgmt
    • Dark Web Monitoring
    • Social Media Hijacking Defense
  • Articles
  • About

Cybersecurity

Cybersecurity

The Anatomy of Business Email Compromise (BEC)

Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations. If an organization relies on wire transfers to make or receive payments, then, sooner or later, it will be targeted. Furthermore, successful BEC attacks are financially devastating, with losses regularly exceeding Read more…

By Eric Vanderburg, 10 monthsAugust 22, 2024 ago
Insider Threats
Cybersecurity

Behind the Firewall: Understanding and Mitigating Insider Threats

In today’s digital landscape, organizations face an unprecedented number of cybersecurity challenges, with one of the most insidious being insider threats. Although such incidents may not be headline-grabbing, they are no less dangerous to the organization when they do occur. Insider threats are particularly challenging because they originate from within Read more…

By Eric Vanderburg, 1 yearFebruary 1, 2024 ago
AI

Cybersecurity Concerns in an AI-driven World

In the era of rapid technological advancement, artificial intelligence (AI) is revolutionizing our lives. From self-driving cars to advanced medical diagnostics, AI’s impact is both profound and pervasive. Yet, as we embrace these innovations, we are also exposed to a host of new cybersecurity challenges. This article delves into the Read more…

By Eric Vanderburg, 2 yearsNovember 16, 2023 ago
Cybersecurity

Email Litigation Holds and Microsoft 365

A litigation hold, also known as a legal hold, is a preservation order that ensures relevant data is protected when an organization anticipates or is undergoing a lawsuit or investigation. Litigation holds serve several important purposes: 1. Preservation of Evidence: A litigation hold ensures all relevant documents, emails, data, etc., Read more…

By Eric Vanderburg, 2 yearsJuly 21, 2023 ago
SaaS Cloud Security
Cybersecurity

SaaS Security: Top 5 Cybersecurity Gaps in SaaS Cloud Adoption

Cloud Usage in Modern Business We have reached the point where most companies are using the cloud for some part of their business.  Some companies operate completely off the cloud without any on-premise server infrastructure.  The wholesale cloud adoption by so many has reached the point where the long and Read more…

By Eric Vanderburg, 3 yearsAugust 18, 2022 ago
Cybersecurity

Reflecting on Cybersecurity in 2020 and the Road Ahead

Learning Objectives: This article on cybersecurity in 2020 includes: A brief overview of COVID-19’s impact on businesses Information on exposed data (hint: it was record-breaking) Threats faced by small and medium-sized businesses Related Information: Cybersecurity Bulletin: SolarWinds Data Breach The Pandemic | Data Breaches | SMB Threats | Conclusion We Read more…

By , 4 yearsDecember 18, 2020 ago
  • About
  • About 7
  • Articles
  • Cybersecurity
  • Governance, Risk, and Compliance
  • Home
  • Home 10
  • Home 3
  • Home 5
  • Incident Response
  • Managed Security Services
  • Penetration Testing
  • Reputation Management
  • Services 5