Understand the Unknown

Social Media Security

Social media has transformed the way we communicate, relate, interact, and live. The human need for social interaction (albeit online) poses to us today one of the biggest cybersecurity challenges. The sheer amount of personal information that we put on social media today is a cybersecurity disaster waiting to happen; and in many cases – […]

The Blockchain – Hype or Reality

What could be the single most transformative technology concept that could change everything we know about risk and internal controls. If you have not heard about the Blockchain, you certainly have heard about bitcoin.  Bitcoin, and other digital currencies like it, are built on the concept of the blockchain – also known as a distributed […]

The ABCs of Phishing

This guide is to walk you through everything you need to know about phishing, starting with what it is, the different types, common techniques being used and tips for prevention. If you are looking for specific information about a specific topic feel free to skip to the section you are looking for using the shortcuts […]

The Human is the New Firewall! #BreachesHappen

If you sit and think about it, you have more employees than you have entry points into your network.   How do you reduce this attack surface? Hackers and other adversaries still engage in the old practice of finding the weakest link in the chain to break in to your organization. When your chain is made […]

Cybersecurity – What’s with the Attitude?

In 2014, we saw the Heartbleed vulnerability arrive on the Cybersecurity scene. ERM had written about Heartbleed a couple of weeks after it was identified and talked about the simplicity with which it can be exploited to render the world’s most favorite Cybersecurity jargon – encryption – completely useless. So it wouldn’t matter if you […]

External vs. Internal Cybersecurity Risks: Know the Difference

Most companies are under constant attack from external forces originating in the digital realm. You may think this sounds somewhat apocalyptic, as if when a major news outlet and a cybersecurity firm make this generalization it is used as some sort of scare tactic; however, it is anything but. Enterprise Risk Management has seen the […]

What Separates a Good Cybersecurity Firm from A Great Cybersecurity Firm

More companies are looking for a cybersecurity firm than ever before. The information security industry is growing almost exponentially, and the future of cybersecurity looks bright. Although larger corporations and banks are developing an in-house cybersecurity department, most companies are outsourcing their digital security to cybersecurity firms like Enterprise Risk Management in Miami, Florida. Most […]

2026: The Future of Cybersecurity

There is a lot of chatter regarding the impending explosion of the cybersecurity industry. Analysts and industry experts all seem to agree that the future of cybersecurity is bright. The industry itself is not new. Enterprise Risk Management has been one of the most respected cybersecurity firms in the industry for 18 years. But the […]

TiaraCon is Here and The Mission is Simple: Bring Women into The Cybersecurity Industry

It is no secret that there is a shortage of women in the tech industry. For years, tech companies have tried to lure women into the lucrative tech business, but it just has not worked out. Enterprise Risk Management is a cybersecurity industry outlier, a cybersecurity firm where woman make up approximately 50% of the […]

The Panama Papers Leak: What International Cybersecurity Firms Learned

Three months after the biggest data leak in history, 11.5 million documents (2.6 terabytes), where does cybersecurity stand now? International cybersecurity firmsare chomping at the bit to discuss the implication the leak had on the international cybersecurity landscape. What does the Panama papers leak mean for international cybersecurity? The leak was biological, not electronic, meaning […]

DNC Server Hack – What is Cybersecurity Doing About it?

First, the Panama Papers, then the Clinton email controversy, and now the Democratic National Committee’s (DNC) server hacking scandal. The lack of cybersecurity and protection in these events leaves international and government cybersecurity firms wondering when will the breach be enough to start discussing increased cybersecurity? The worst part: computer incident response and forensic cybersecurity […]

Hacking Statistics Illustrate the Need for Penetration Testing

The shocking reality of cyber-security for businesses is that the chances that your business will eventually be hacked are high. Companies have two choices: safeguard their business through the use of penetration testing from a cybersecurity agency, or be hacked and then have to hire an agency to clean up the mess, which typically happens. […]

ERM’s Incident Response Services

After a theft, fire or disaster, experts sift through the rubble to determine how it happened, how to prevent it in the future, and who to charge if it had criminal implications. On the surface, cyber forensic services are similar to any real-world forensic services. The Internet and World Wide Web is very young, which […]

Malware: Bangladesh Bank Heist

The recent Bangladesh Bank heist resulted in $81 million in theft and was tracked to the Philippines before disappearing in February. The cyber criminals are still at large and have left everyone wondering whether this was an issue originating from the cyber security of the bank or bank employees? Malware was used to monitor bank […]

Myspace and Tumbler: No target too big or too important for cyber-hackers to compromise

When it comes to the recent Myspace and Tumblr hacks, Enterprise Risk Management, a global cyber security firm, states that there is no target too big ortoo important for cyber-hackers to compromise. When we hear about cyber-attacks on major online networks and companies, the tales are much like the story of David versus Goliath. Cyber-security agencies in Miami want […]

Federal Cybersecurity: Apple and the FBI

The legal battle between Apple and the FBI has taken an unexpected turn after the FBI announced that it had successfully hacked the iPhone belonging to the San Bernardino killers. This of course comes as a bit of a surprise to Apple as well as to Apple customers, since most assume that iPhones are secure. […]

Social Engineering: Major Aspect of Hacking

Social engineering is defined as hacking humans through manipulative interactions. People are tricked into willingly giving out sensitive information to hackers and people with malicious intent. Social engineering has become a major aspect of hacking as of late, and its impact on cyber security cannot be understated. Frank Abignale is the most famous social engineer […]

Social Media & Cybersecurity: Employee Awareness

Social media poses a cybersecurity challenge to all companies. On one hand, it is a powerful tool that can make a massive difference to your company’s image, while maintaining important and valuable lines of communication with clients and customers. One the other hand, it could represent a potential cyberattack point to hackers looking for sensitive […]

Cyberlaw: Virtual Wild West

The cyber law landscape is a virtual wild west. Because the internet is still so young, there are a lot of legal precedents that still have not been set, and even more confusion in terms of location. It’s not an easy fix. For one whose law do you follow? All law is based on geographical […]

5 Distinct Security Breaches: Phishing, Malware and others

The cyber security professionals at Enterprise Risk Management have dealt with every form of cyber-attack and breach there is. There are 5 distinct types of security breaches that all businesses and networks should know about. Malware – This is a general term that describes any virus. It’s what you get when you combine malicious intent […]

Cybersecurity – Continual Upgrades Required

The recent rise in ransomware attacks has put a spotlight on cybersecurity throughout the world. Multiple hospitals and law firms have been attacked in the past few weeks and it shows no sign of stopping. Once viruses like ransomware infect your system, the only way to stop them is to pay the ransom, or lose […]

FFIEC Assessment Tool: Necessary to Combine with Assessment

Viruses and malware aren’t going anywhere. Cyber threats are constantly evolving in an attempt to stay ahead of the curve. Now more than ever, it’s important for every cybersecurity firm to stay one step ahead of the would-be cyber criminals. Federal cybersecurity analysts and experts created the FFIEC cybersecurity Assessment tool as answer to cybersecurity […]

Ransomware: Why Is it Winning?

It’s hit and it’s hit hard. In the past week, dozens of companies around the world have had their data held hostage causing the phones at cyber security agencies in South Florida to ring off the hook. Businesses in Germany, Ireland, and the U.S. have become victim to a new crypto-ransomware virus. And the hackers […]

Cloud Computing: Safer Than You Think

Cloud computing is a mainstay in today’s digital climate, and while it’s only ever expanding, some large institutions remain slightly hesitant to give up their valuable and sensitive information to the world of the cloud. Of course the cost benefits of cloud computing have lured most away from traditional forms of data storage, but the […]

Software Development: Keeping Cybersecurity in Mind

Exploratory software testing is a technique used by software developers to simultaneously test and explore the code they are writing while they write it. It’s a form of combining the test phase and creation phase of software at the same time. In terms of cyber security, it can be invaluable. With the correct mindset, developers […]

Banking & Cybersecurity: Awareness Is Step 1

Financial cybersecurity is a top priority for the Federal Financial Institutions Examination Council (FFIEC). But it’s not just them. Banking institutions are always remaining vigilant in the defense against cyber-attacks. Year after year, statistics released show that financial institutions are top of the list of most targeted organizations. Cyber criminals are always looking for an […]

ISO27000: Plan – Do – Check – Act

An information security management system outlines the set of policies behind information security risks. This principle ensures that all information management risks are handled correctly to provide minimum levels of security. Some examples of important information that must be managed correctly would be financial data, employee information and property details. No matter the size of […]

Washington: The Capital of Cybersecurity

It seems that everywhere you go nowadays, people are discussing the issues of cyber security and its ability to drive economic growth in Washington. A lot of professionals agree that Washington has extreme potential for expanding cyber security business in the area; however, they are disagreeing on the fact that progress is slow and the […]

Basic Steps to Take When Dealing With Data Security Breach

As a cyber security company in Miami, Florida, Enterprise Risk Management believes that in a perfect world, security threats and data breaches would be non-existent. We have left the era where 100 percent protection from data breaches was even remotely possible. We are now living in a technological time where even a single, seemingly harmless act […]

Cloud Security Services: Essentials

Enterprise Risk Management believes that one of the major benefits of cloud computing is the increase in efficiency. Cloud computing allows services to be rapidly deployed and ready for use in a matter of minutes, in comparison to the weeks or months that it can take through traditional methods. While cloud computing services offer many […]

ISO 9000: Principles & Benefits

The International Organization for Standardization’s Technical Committee produces the international quality management and quality assurance standards known as the ISO 9000 series of standards. Enterprise Risk Management is aware that most businesses have heard of the ISO 9000 standard series, which provides a starting place for all encompassing quality efforts. ISO does not lend its […]

PCI, HIPAA, FedRAMP: Cloud Compliance

“The Cloud” – it is a phenomenon that has become one of the hottest buzzwords in technology over the past few years. There are myriad benefits to using cloud computing including easier file backup and storage, the ability to access information from anywhere in the world, and the power to harness the cloud to create […]

It’s Your Dream Home: Protect It and Yourself

When seat belts came onto the world scene, they cost $200 and nobody was interested.  Insurance was first ridiculed and then considered a luxury for a long time.  You can’t really live without these today, can you? Both seat belts and insurance have become personal involvement issues in our lives today.  In fact, ABS and […]

Latin America: Emerging Market & Target of Cybersecurity Risks

Latin America represents probably the largest conglomeration of countries that are jointly posing impressive economic growth, year after year. With Brazil, Mexico, Argentina, and Colombia leading by example, Venezuela, Chile, and Peru have shown significant promise. In the backdrop of an unenviable world economy, Latin America has quietly but surely performed. While the world is […]

CFO: Cybersecurity Questions To Ask

Historically speaking, financial information has been the most important information asset. Ancient Mesopotamia used to protect financial and barter records of the royalty’s treasuries. Empires from Rome to India and Egypt to China used encryption to protect financial information from subterfuge. Times have changed today, and how, but the principle of protecting financial information still […]

Mergers & Acquisitions: Keeping Security In Sight

Studies indicate that mergers fail more often than marriages. Divorce rates in North America hover between 40 percent and 50 percent, and the figure for unsuccessful mergers is between an alarming 70 percent and 90 percent. The itch to compare mergers with marriages is undeniable, because all too often the similarities are too many to […]

Sign Up for Our Newsletter