cybersecurity vulnerabilities

How to Eliminate 63% of Your Cybersecurity Vulnerabilities in 90 Days

Cybersecurity vulnerabilities are a concern for every company in every industry. In 2016, 4.2 billion records were stolen during 4,149 reported data breaches. This doesn’t take into account breaches not noted in the public record. According to a Ponemon Institute survey, while security incidents have expensive consequences, costs associated with reputational damage are even greater. That explains…

Strategic ERM

What’s Changing in the Approach to IT GRC?

Increasing cyber-hazards have been accompanied by another trend; Governance, Risk Management, and Compliance (GRC) focused on IT (referred to as IT GRC) is changing. More and more organizations have been turning to a risk-based approach. Traditionally, IT is comprised of a variety of underlying functions. These functions include: IT Asset Management, commonly used to inventory…

COSO ERM framework update

Increased Credit Card Security Means Increased Compliance Risks and Liabilities for Businesses

Here at LogicManager, we’ve spent a lot of time considering issues related to cybersecurity. To find a new way in which a cybercriminal has exploited electronic vulnerabilities, all you need to do is skim today’s newspaper, which will almost inevitably report a data breach or fraud-related scandal. An evolving set of threats means incident likelihood…