top of page
Brockton Point Solutions seamlessly integrates CrowdStrike’s Falcon platform

Blog
Latest Articles on Cyber security Trends


Eliminate the Stress of Compliance
Compliance as-a-Service is a value-added service provided by a third-party consultant that helps your business meet its regulatory compliance requirements. Through a service level agreement, businesses can unburden the never-ending list of regulations. For many, the idea of hiring an outsourced compliance consultant or paying for outsourced compliance services does not always seem achievable.
Sep 29, 20223 min read


Leveraging a Virtual CISO
The increasing risk of cyber-attacks coupled with compliance obligations has meant that even small and medium sized organizations are scouting for executive leadership to support them in the critical field of cybersecurity.
Aug 17, 20223 min read


The Value of Recon
Reconnaissance is the first action in which a threat actor engages with a target and for our purposes can be defined as the use of openly available Internet sources of information to gain insight into an organization’s applications, services, technologies, people, and webpage relationships. In a nutshell, reconnaissance is nothing more than locating and analyzing publicly available sources of information about an individual or organization.
Jul 25, 20224 min read


The Future is Now, PCI DSS 4.0
When customers provide a company with their credit card information, they trust that their data will be processed, stored, and transmitted securely. To ensure that businesses meet that expectation, major credit card companies alongside the PCI Security Standards Council, created the Payment Card Industry Data Security Standard or PCI DSS for short.PCI DSS is a set of technical and operational requirements intended to protect account data, combat fraud
May 23, 20223 min read


Enforcing a Cybersecurity Strategy
The changed world we have found ourselves living in since the global pandemic struck in 2020 has been particularly helpful to cybercriminals. Working from home, the ongoing digitization of our lives, and the increasing online nature of business mean opportunities for phishers, hackers, and scammers have increased.
Mar 28, 20223 min read


Conduct Your OSINT Using Mitaka
Open-Source Intelligence or, OSINT, is the collection and analysis of information gathered from publicly available sources. This extends to much more than a Google search. There is much more information on the internet than can be found using search engines. It is estimated that only 4% of the internet is searchable using search engines.
Mar 4, 20223 min read


Importance of Audit Log Management
Audit logs play a critical role in security management. They can provide us with insight into what has happened on our systems, and on our networks at any given time. More specifically, if implemented correctly, logs can tell us what happened across multiple systems and when a system is compromised, it will log and record all activity of the attacker. These logs can help us prevent or detect violations of confidentiality, integrity, and availability.
Jan 23, 20224 min read


Reduce excuses, strengthen your company’s Cybersecurity posture
Cybersecurity professionals are far too familiar with the classic response “It won’t happen to us.” This is a common excuse among business owners that are hesitant to invest in cybersecurity. Unfortunately, many small and medium sized businesses are falling victim to cyber criminals. It is imperative that all organizations regardless of size take the necessary precautions to protect their customers and brand.
Dec 20, 20212 min read


Why you should perform a PCI Compliance Readiness Assessment
A Payment Card Industry Data Security Standard (PCI DSS) readiness assessment can help your organization determine whether you are ready to undergo a full PCI DSS audit or self-assessment.
Nov 30, 20212 min read


Killware: the future is now
While most malware is deployed to steal privileged information or extort money from victims, Killware poses a much greater threat. Killware is a blanket term for any number of cyberattacks that are targeted at killing or damaging the real-life health of targets and defined by its result. These attacks could take place on any scale, either against one victim or a larger population.
Nov 8, 20212 min read


Reliable Cybersecurity Risk Assessments Will Reduce Vulnerabilities
A cybersecurity risk assessment helps an organization expose and prioritize issues that could damage your brand and cripple your operations. The risk assessment process starts with a series of interviews conducted by a Brockton Point Solutions representative and key members of your organization to analyze your policies, procedures, and controls.
Oct 2, 20213 min read


Selecting a Trusted Information Security Partner
Nothing is certain in today’s security landscape and the threats businesses face are evolving daily. Due to the increasing complexity of cyberattacks, many organizations have started to realize the advantage of outsourcing their information security to expert partners.
Sep 15, 20214 min read


How To Effectively Measure Your Cyber Security Program
In order to reduce your business cyber risk you have to measure the effectiveness of your cyber security program to ensure you are allocating resources to initiatives that bring the largest return on investment. An effective program helps with successfully achieving budget approval because the cost can be justified as it is based on data driven decisions. Cyber-attacks continue to increase against organizations of all sizes.
Aug 27, 20214 min read


Tips for CISOs to strengthen your Cyber Security Culture
Throughout the Covid 19 pandemic organizations around the globe have been reacting to the turmoil created by the uncertainty of the ongoing crisis. Senior leaders are adjusting operating models faster than ever before to ensure survival. For many CISO’s they have been working diligently to advance their digital business strategy and accelerate opportunities to leverage technology.
Aug 11, 20212 min read


Keys to a Strong Cyber Resilience Posture
As the landscape of Cyber Risk grows both in complexity and frequency your organizations data, client information and risk management practices should be one of your top priorities. Conventional security solutions and methodologies are no longer enough to combat today’s intricate cybercrimes. The Cybersecurity field has shifted considerably, your organization needs to brace for impact and become resilient.
Jul 29, 20213 min read


Effective ways to reduce risk of ransomware attacks
Within the last few months high profile ransomware attacks are making headlines around the globe. Recent cyber-attacks that have used ransomware as their attack route include attacks perpetrated against the Colonial Pipeline and JBS (the world’s largest meatpacker) resulting in a combined payment of $15.6M. These large attacks are serious and examples of the threats businesses face every day.
Jun 27, 20213 min read
bottom of page