Blog

Blog

What are the different types of security penetration testing?

Security penetration testing (also known as pen testing) is often mixed up with the concept of vulnerability scanning for a corporate network. To clarify, vulnerability scanning is simply when cybersecurity professionals assess digital infrastructure and systems to find points of potential access or vulnerability.

On the other hand, security

Read More…

Common Forms of Social Engineering Attacks

Imagine: You receive an email from your company payroll department. The email confirms your request to change your direct deposit details for your most recent paycheck. You see that the paycheck has been deposited into a new account. The message indicates that your account has been successfully updated. One problem — you never submitted such a

Read More…

Law firm cybersecurity threats to keep aware of

Watch almost any movie from the 90s or early 2000s dealing with computers and you will see a highly stylized version of “hacking”. The scene will probably feature a t-shirt or hoodie-clad “hacker” sitting in a basement, surrounded with computer screens and green text. Cue to a closeup of the hacker furiously typing while green text scrolls down

Read More…

Best Practices for cybersecurity audits

From Westlaw to Word, your law firm’s digital operations help advance client interests. While you work to protect your clients in the courtroom, clients are increasingly asking whether you also protect their data in the cyber arena. Law firm data presents a lucrative target - law firms are often viewed as “one-stop shops” for attackers – with

Read More…

What type of information security officer does your company need?

Today’s data-centric businesses rely on a secure cyber environment to operate within. If you are a small firm, you may task contractors or your general IT support staff to handle your security needs. Mid-size to large firms, however, most likely employ an information security officer (ISO), also known as a Chief Information Security officer, or

Read More…

Shield yourself from healthcare's cybersecurity storm

A storm is on the horizon and if you are a part of the healthcare industry, prepare for rough seas. This storm, without rain or thunder, is digital and presents an even more burdensome proposition for healthcare organizations: the mass digitization of health and medical records (collectively, “EHRs”). In adopting new technologies to digitize

Read More…

Why Law Firms Should Invest in Cybersecurity

For lawyers who may juggle a morning court appearance followed by an afternoon spent inside corporate boardroom meetings, the issue of cybersecurity may seem a distant, low priority. However, law firms should emphasize cybersecurity as a top concern because of the sensitive information they have to handle, both inside and outside of the courtroom.

Read More…

The biggest cybersecurity risks facing law firms today

The American Bar Association has been calling attention to cybersecurity for its members for quite some time now. They’ve gone so far as to state, “It’s when not if, a law firm or other entity will suffer a breach.”

It’s their job to keep members informed and help them, and we applaud them for raising awareness of cybersecurity for their members.

Read More…

Costs Associated with Underinvesting in Cybersecurity

Everything has a cost. Whether literal (as in dollars and cents) or figurative (as in lost productivity, retention, and other issues), cybersecurity is no exception to the rule. 

When you think about cybersecurity, your mind probably, rightfully, goes immediately to security breaches. They seem to fill the headlines, with both major corporations

Read More…

How to Measure Cybersecurity Effectiveness ー Before It's Too Late

Here at Vala Secure, we’re not fans of fear mongering. For us, cybersecurity and the threat of hacks or breaches are part of the reality of doing business today. That’s not to say we don’t take them seriously –– we consider ourselves your guide as you navigate those ever-murky cybersecurity waters. If we can help you take action to protect your

Read More…