Using the NIST Cybersecurity Framework to Build Your Cybersecurity Program
As an industry-agnostic approach to cybersecurity, the Framework is often the basis for assessing the cybersecurity posture of commercial and public entities.
Outsourced Cybersecurity: What is an ESO & What are the Benefits?
With the influx of cyber-attacks in recent years, businesses are struggling to protect their data and create an updated strategic cybersecurity plan. That’s where an Executive Security team like Centurion ESO could be an organizational asset. What is an ESO? So, what is an ESO? ESO stands for Executive Security […]
Top 5 Cybersecurity Threats in 2022 (And How to Protect Your Business)
This article looks at the top trends in cybersecurity to watch out for in the new year. The sector is fast-moving, and hackers are constantly improving their abilities on pace with cybersecurity providers. Here are some of the major attacks that have happened this year and what to look out […]
SCADA Cybersecurity: Protect Critical Infrastructure and Production
SCADA systems, known as supervisory control and data acquisition systems, are essential to many industries but can be a major cybersecurity risk.
How to Prevent + Manage Ransomware
Malware and ransomware cases are on the rise. Cybercriminals are lured to the lucrative win of encrypting an organization’s files, then holding them for ransom. According to Security Intelligence by IBM, Q1 2016 saw a record high for ransomware...
Super Bowl’s Coinbase Commercial Glosses Over Risks of QR Codes
Coinbase’s commercial during the Super Bowl involved a QR code that millions scanned; while this is effective marketing, it’s also an important reminder of the potential risks of QR codes.
What Is DFARS? (+ Your Compliance Checklist)
Learn what is DFARS, its importance and benefit to your enterprise, and how to be DFARS compliant.
Cybersecurity Awareness: 7 Factors for Your Employees to Consider
Prepare your employees to identify and manage potential cyber security threats. Would your employees recognize a social engineering scam such as CEO fraud? Do they even know what their information security responsibilities are? Even if your organization has invested in advanced security solutions to protect sensitive business data, they won’t […]