Crime Does Pay

Well, at least cybercrime does. In fact, it turns out that it pays well. Bromium published a report in 2018 in which it asserted: “High-earning cyber criminals can make $166,000+ per month; Middle-earners can make $75,000+ per month; Low-earners can make $3,500+ per month.” That is serious money for the high and middle earners. For

Apathy: CyberSecurity’s biggest HURDLE

WE ARE COMFORTABLY NUMB, AND THE DATA AGGREGATORS KNOW IT…. Who knew Pink Floyd’s classic rock hit could be the theme song to the current state of data breaches.  Given the lack of any lasting public outrage for data breaches and leaks of personal data, I find myself wondering if the masses really care?  Meaning,

A Multi-layered Approach to Securing Data Assets

In this 3rd of 6 Vblogs, CTI’s Ben Thurston explains to Mark Janowicz that there is no one cybersecurity solution that will solve all problems when it comes to data security.  The best approach, Ben explains is a multi-layered one. The data that is owned by your marketing team contains a lot of important and

Marketing and Cybersecurity – Protecting Against Breaches

Marketing people have access to a lot of customer data – and that makes them prime targets for data breaches – Mark Janowicz talks to Ben Thurston about what marketing professional needs to know about cybersecurity. In this second of six video blogs, CTI’s Ben Thurston explains that not all data are treated equally and

Why Equifax Type Breaches Will Continue

Cybersecurity, cyber lessons, data security

Lessons Not Learned from Target – Why Equifax Type Breaches Will Continue. It’s hard to believe the massive data breach at Target that cost their CEO and CIO their jobs occurred almost four years ago. It was a very high-profile data breach that should have put all C-suite executives on notice that if you fail

Marketing Analytics and Cybersecurity

Cybersecurity and marketing analytics go hand-in-hand because at the end of the day it’s still about keeping data about your customer and prospects safe and out of the hands of cyber criminals.  You certainly do not want the theft of sensitive information to be the next news headline! In this first of six video blogs,

The Equifax Hack – The Ingredients for Misery

On Sept 7, 2017, Equifax announced they were hacked sometime between May and July of this year. The incident potentially impacts around 143 million U.S. consumers, exposing names, Social Security numbers, birth dates and more. All the ingredients identity thieves need to cook up some misery. Obviously, we all have reason to be concerned by this breach

Triangulating and closing security compromises

But the CEO told me to wire $60K to the Caymans! We’ve seen a recent rash of e-mail exploits that blend “social engineering” with e-mail technology. These exploits use e-mail to impersonate respected leaders and authorities of an enterprise giving direction to subordinates or delivering malware payloads and links in what looks like a trusted

How to Value the Cost of a Data Breach

As the Founder and CEO of a technology consulting firm, there are many proprietary data concerns that we must consider and protect, not the least of which is our client information. While our firm, Corporate Technologies, Inc (CTI). may not be directly subject to data security regulations, providing services to many of our clients obligates

Is your manual Incident Response up to snuff?

Do you believe what the security experts say? That bad actors will penetrate your network, so it’s not a question of “if” but “when”? Believe it or not, it’s true. The evidence is clear that even well-funded security teams can’t keep hackers out.  The paradigm has shifted and the new focus needs to include how


© Corporate Technologies, Inc.   |  Privacy & Legal