Blog
Cloud Security: 5 Things to Consider When Migrating to the Cloud
Cloud migration strategy is essential for a business’s security. Read about the cloud security factors to consider when migrating to the cloud.
Blog
Tax Season: 7 Ways to Protect Your Business from Hackers
Are you prepared to protect your organization from hackers this tax season?
Webinar
[Access Recording] A Practical Cybersecurity Assessment Approach: Ransomware
Access our recent webinar on ransomware on-demand.
Blog
Cybersecurity News Flash: Concerns with geopolitical turmoil and warfare in Russia and Ukraine
Understanding the increased risks for cyberattacks as a response to international sanctions.
Webinar
[Access Recording] A Practical Cybersecurity Assessment Approach Webinar: NYDFS
Learn how organizations can develop and maintain an effective cybersecurity program that meets the requirements of the NYDFS Part 500 regulation.
Blog
How to Move to Zero-Trust Security in 9 Steps
Is your virtual private network (VPN) technology keeping your network safe? It might not be as secure as you think it is.
Blog
The Top 6 Cybersecurity Practices to Kick Off the New Year
There's no better time to review and enhance cybersecurity across your organization. Follow our top six practices to start the year off right.
Blog
7 Best Practices for Penetration Test Planning
As you implement penetration testing in your environment, follow our seven best practices for effective results.
Webinar
[Access Recording] A Practical Cybersecurity Assessment Approach Webinar: FFIEC
Access our latest webinar on demand.
Blog
6 Criteria for Choosing a Managed Detection and Response Provider
As you evaluate MDR providers for your organization, make sure your choice meets the right expertise to strengthen your security posture.
Blog
6 Ways to Protect Against Today’s Top Cyber Threats
To protect your environment from exposure to cyber threats, you must secure it with the right mix of expertise, processes, technologies, and tools.
Blog
5 Reasons You Need Managed Detection and Response Right Now
Learn how to stay ahead of cyberattacks before they happen, as cybercrime rates increase by nearly 600% as a fallout of the COVID-19 pandemic.
Blog
How enterprise cybersecurity teams can mitigate against individual data security complacency
One of the biggest risks that enterprise cybersecurity teams face in 2021 is complacency from company employees.
Webinar
[Access] CyZen and Exabeam Webinar Recording
Access this powerful webinar recording where experts from CyZen and Exabeam provided an in-depth view of ransomware.
Blog
Uncharted Territory – Achieving Cyber Success in a Hybrid Work Environment
In the hybrid work model of the near future, business leaders need to keep digital parity in mind.
Blog
Three Ways to Protect Your Company’s Network Infrastructure from Data Exfiltration and the Cost of Inaction
Recently, a user in a low-level hacking forum shared the phone numbers and personal data of roughly 533 million Facebook users.
Blog
How Trustworthy Are Your Third-Party Vendors?
Protect your business by implementing a thorough third-party risk management program (TPRM).
Video
Outlook from the Inside: Key Cybersecurity Considerations for a Remote Workforce
How can you ensure your remote workforce is cybersecure? Will Mendez and Mike Greenwald weigh in.
Blog
Meeting The SEC Cybersecurity Disclosure Requirement Through Risk Management and NIST
Learn if your public company is making the right adjustment to comply with SEC Cybersecurity Disclosure Requirement Through Risk Management and NIST.
Video
Protecting Your Public Company From Cyber Threats
Watch this exclusive video to make sure that you are taking all of the necessary steps to protect your public company from cyber attacks.
Blog
Post-Economic Shutdown: Cybersecurity Debrief
How businesses have managed sudden decentralization and the implementation of remote work strategies
Video
CyZen Client Success Spotlight: Arizona Beverages
CISO of AriZona Beverages, Michael Mendelsohn, shares how our experts guided them through the security challenges associated with a remote workforce.
Blog
FireEye Hacked! What This Means For The Rest of Us
The recent breach at FireEye is even more evidence that cybersecurity strategies need to emphasize detection, response and recovery
Blog
FireEye Breach: Three Key Lessons
Learn three key lessons from the recent FireEye Breach the latest cybersecurity company to suffer from an attack.
Blog
How to Protect Your Real Estate Business from Cyber Attacks During and After the COVID-19 Pandemic
Real Estate and cybersecurity.
Blog
How Cyber-Secure is Your Remote Workforce? Expert Tips in the Time of COVID-19
Take these cybersecurity measures to help safeguard your business, employees and customers in the midst of the COVID-19 pandemic.
Blog
[COVID-19]: Five Ways to Keep Your Remote Workforce Cyber-Secure
In a national effort to curtail the spread of the coronavirus (COVID-19), we are witnessing the rise of the remote workforce.
Blog
5 Techniques to Get You Ransomware-Ready
Most of us have heard of “ransomware,” but what is it? Who does it impact? How can you protect your business?
Blog
6 Tips to Protect Your Business from Third-Party Vendor Attacks
Check out these tips to help safeguard your business from third-party vendor attacks.
Blog
Digital By Default: Prioritizing Cybersecurity in Your Real Estate Business
As smart cities continually evolve to stay ahead of demand, owners and developers adapt by rapidly digitizing their buildings and transactions.
Blog
Cybersecurity Techniques to Keep You Grounded Against the Winds of Change
Our cybersecurity experts are here to guide you through four powerful techniques to protect your valuable assets.
Blog
Tips on How to Avoid the Cybersecurity Pitfalls of Big Companies in 2018
2018 has proven that even the biggest companies—and government entities— aren’t immune from a growing number of cyber attacks.
Blog
Safe Travels: Cybersecurity Tips for Your Next Journey
No matter the destination, the risk of cyber-attacks soar the moment you hit the road. Here's a few tips on protecting your data while you're abroad.
Blog
The Price of Convenience: How to Protect Your E-commerce Business From Cyber Attacks
With 230.5 million shoppers anticipated by 2021, online shopping provides a direct portal for cyber-attackers to victimize consumers.
Blog
The F.B.I. Urges You to Reboot Your Router
I’s not time to panic yet, but your router, gateway to the internet highway, may be compromised.
Infographic
Countdown to GDPR: Is your cybersecurity plan up to speed?
On May 25, 2018, the E.U. launches the General Data Protection Regulation (GDPR) - the most important change to data privacy regulation in decades.
Blog
A Look at GDPR Through a Legal Lens
Managing Director of CyZen, Jacob Lehmann, sat with Co-Founder and Managing Partner at XPAN Law Group, Jordan Fischer, to dive into details on GDPR.
Infographic
Lock It Up: Tips to Safeguard Your Private Information on Facebook
CyZen’s cybersecurity advisors share necessary steps you can take today to protect your privacy.
Blog
Drop the "BAS": Protecting Building Facilities and Inhabitants from Cyber Attacks
Building automation systems ("BAS") ease property managers’ daily operations.
Blog
K-12 Cybersecurity: Helping Schools Pass the Test
Since January 2016, cybersecurity incidents in Kindergarten through 12th grade public schools across the United States are up 223% year-over-year.
Blog
5 Tips to Keep Cryptocurrency in your Wallet and out of Thieves’ Pockets
Take cybersecurity into your own hands with these five simple tips from CyZen's cybersecurity advisors.
Blog
Phishing for Your W-2: Key Cybersecurity Tips to Avoid Being Caught During Tax Season
Phishing campaigns topped the IRS “Dirty Dozen” List of Tax Scams for 2017.
Blog
“Spectre” and “Meltdown": Tips to Minimize Risk from the Latest Widespread Cybersecurity Threat
Security researchers recently discovered a hardware information flaw in computer processors across millions of devices