Charisma Burghouts

Picture of

Recent Posts

The Good, the Bad, and the Ugly of 5G for Business

February 19, 2021 / by Charisma Burghouts

The Good.

The advent of 5G is an exciting development in connectivity for most businesses. From the farmer who can now remotely monitor field conditions to the global manufacturing leader dependent upon a digital supply chain, to mom-and-pop shops offering real-time-customer service, 5G is changing the way business gets done. And both owners and consumers are enjoying the benefits!

For most, 5G still lacks the true “100 times faster” connection that service providers touted it would bring in 2019. But still, its improvements to speed and lower latency over 4G LTE for business connectivity have already established it as a game changer.

Although 5G is one of the fastest growing technologies in history with adoption 4x as fast as LTE, it will be years before 5G networks blanket the globe. However, explosive adoption is already well underway in the automotive, manufacturing, utilities, and healthcare industries, all of which have been catalysts for a rush on new IoT devices for business efficiencies, enhanced customer service, the movement of large amounts of data, and more.

As 5G network availability grows, the potential for 5G IoT business devices has grown exponentially. Unfortunately, the security risks have grown with it

Read more

The cost of not meeting NIST 800-171 requirements...more than a missed opportunity

February 08, 2021 / by Charisma Burghouts

The Department of Defense (DOD) put out a deadline mandating that specific controls for Covered Defense Information (CDI) and Controlled Unclassified Information (CUI) residing in nonfederal information systems be in place. Many DOD contractors and subcontractors have missed the deadline and are scrambling to update their cybersecurity standards.

Read more

Merry Christmas and… Happy Hacking?

December 21, 2020 / by Charisma Burghouts

'tis the season to lose data

Overall consumer spending online remains dramatically elevated thanks to the pandemic, and no one is predicting a decline in post-holiday online sales. The sweet spot between Christmas and New Years that brings a frenzy of shoppers searching for year-end bargains isn’t just for those looking to use their gift cards. It’s also a special time of year for cybercriminals who ramp up efforts to phish, scam and hack their way into companies to gain access to valuable data.  

Read more

CCPA: The 500 Pound Gorilla Sitting on Your Security Strategy | Fornetix

November 16, 2020 / by Charisma Burghouts

CCPA stands for California Consumer Privacy Act. However, your company doesn’t have to be located in California for this law to affect business. If you’ve collected personal data on at least 50,000 people, or have $25 million or more in annual revenue, CCPA applies to your organization.

Read more

CISO SCENARIO: Your Subcontractor Has Been Breached | Fornetix

October 08, 2020 / by Charisma Burghouts

Let us consider a scenario in which an organization, a general contractor utilizing at least one subcontractor, implements a production chain security strategy powered by encryption, but NEGLECTS the addition of a key management system. You’re the CISO, responsible for the cybersecurity strategy that ensures your organization’s information assets and technologies are adequately protected.

Read more

Why Encryption Key Management Can't Be an Afterthought | Fornetix

May 27, 2020 / by Charisma Burghouts

The latest best practices in enterprise data security include utilizing KMIP AND an encryption key management solution. While most security conscious companies are mindful of the latest advancements in storage encryption, there is a lack of attention to the requirements necessary to managing the thousands of keys generated from multiple data centers, storage devices, and software — specifically, enterprise level encryption key management systems have been overlooked, leaving companies vulnerable.

Read more

Hackers Threaten Healthcare Data and Patient Care as Hospitals Endure Overload | Fornetix

March 26, 2020 / by Charisma Burghouts

Every industry is vulnerable to data breaches, but the healthcare industry has long stood out above the rest. This vulnerability may prove particularly damaging not only to Protected Health Information (PHI) during the COVID-19 crisis but also patient care. 

Read more
1
Page 1 of 1

Subscribe to Email Updates

Recent Posts