Skip to main content

Blog

Guide Star Blog

Evan Rice

Cybersecurity | Security

By: Evan Rice
August 30th, 2022

In our latest episode of The Good, Bad, and the Ugly series, Evan talks about why you need a good Cybersecurity Training Program in your organization.

Cybersecurity

By: Evan Rice
August 16th, 2022

You’ve probably heard the terms “Red Team” and “Blue Team” mentioned when discussing cybersecurity. Every organization, regardless of size, should be assessing their cybersecurity defenses and security team. You want to make sure your business is safe from attacks and data breaches. In today’s modern world, security breaches and attacks are increasing and businesses don’t have the capacity or right team to mitigate these risks. This is where the Red Team and Blue Team come in to play.

Cybersecurity

By: Evan Rice
August 2nd, 2022

Cybersecurity is recognized as one of the fastest-growing technology markets globally. According to Gartner, enterprise spending on cloud security solutions is predicted to increase from $636M in 2020 to $1.63B in 2023, attaining a 26.5% compound annual growth rate (CAGR).

Cybersecurity | Security

By: Evan Rice
July 18th, 2022

Do you know what it takes to make a GOOD password? Chances are your passwords aren't secure and could be easily guessed. If your passwords are hacked, your personal data and information could be at risk. Watch this video, The Good, Bad, and the Ugly: Passwords, to understand what it takes to have a good password and ensure you aren't vulnerable to hackers. 

Cybersecurity

By: Evan Rice
June 28th, 2022

Welcome to our new video series with Guide Star Senior Vice President, Evan Rice! We will be dropping new monthly videos on the Good, Bad, and Ugly of Cybersecurity and IT topics. Be sure to subscribe to our blog and YouTube channel so you never miss a new video!

Cybersecurity | Support Services | Security

By: Evan Rice
June 28th, 2022

As we are all too familiar with, data breaches and cybercrimes are on the rise and causing major headaches and financial loss for businesses of all sizes. Cybercriminals want us to believe that large corporations are the only businesses getting hacked, however, small to medium-sized businesses (SMBs) are just as susceptible to cybercrime. In fact, 43% of cyber attacks target small businesses, according to Verizon’s 2020 Data Breach Investigations Report.

Cybersecurity | Consulting

By: Evan Rice
April 20th, 2022

The systems development life cycle (SDLC) is a process any IT team member or software developer will be familiar with.  

Cybersecurity | Consulting

By: Evan Rice
April 15th, 2022

Every second, data is being transferred to and from your employees’ computers. The data can be anything from a simple Word document to highly sensitive information. Keeping sensitive data secure is a big part of having a cybersecurity program. How do you accomplish this? For starters, your IT team will need to implement strong technical controls. A technical control is a system-based protection to reduce risk and/or the chance of human error that can introduce risk. Let’s say one of your company’s cybersecurity policies is having a nightly backup of your data. The technical control is having a system to automatically back up the data, instead of having an employee do it manually. Employee Stock Ownership Programs (ESOP) need to have technical controls to protect their employee-owners’ assets. Guide Star understands the intricacies of an ESOP and the importance of protecting your company with technical controls and encryption.

Security | Consulting

By: Evan Rice
April 6th, 2022

Managing your company’s data can be a tall task for any business, and every business will have a system that is owned and operated by a third party provider.  Many choose to utilize a third party storage system for storing their data and assets. One of the more prominent examples of this is the cloud. It is becoming increasingly common for businesses to explore the option of moving their storage from a traditional server structure to a cloud-based model.   The Department of Labor’s (DOL) best security practices for ESOPs recommend performing security reviews of the data you have stored on the cloud. While conducting a timely security review for the cloud is important, it’s critical to conduct these reviews for any third party IT structure you house data on. Better than safe than sorry. 

Cybersecurity | Consulting

By: Evan Rice
March 29th, 2022

In today’s workplace, ensuring only authorized access to your company’s systems is a key component of any cybersecurity program. Bad actors are no longer just lurking in the dark corners of the internet, they are everywhere your systems are, and may even be working inside your company.   One of the main tactics hackers use to gain access to your systems by hijacking legitimate credentials. They do this by social engineering. Social engineering is the art of manipulating people, so they give up confidential information.