Incident Response Tabletop Exercise
Incident Response Tabletop Exercise: The “Fire Drill” of Information Security An Incident Response Tabletop Exercise is a “Fire Drill” for a company’s Incident Response Plan…
Information Security Terminology
Information Security Terminology: Key Terms Every Business Needs to Know In today’s interconnected world, where digital threats are an ever-present danger, understanding information security terminology…
Information Security vs. Cyber Security: Understanding the Key Differences and Overlap
Information Security vs. Cyber Security: Understanding the Key Differences and Overlap In today’s rapidly evolving digital landscape, safeguarding data and information is more critical than…
CAN/DGSI 104:2021 Rev 1 2024 (formerly CAN/CIOSC 104: 2021)
Latest version now available for download: CAN/DGSI 104:2021 Rev 1 2024 The latest version of CAN/DGSI 104:2021 Rev 1 2024 framework outlining baseline cyber security…
New CPCSC Certification Rules for Businesses Bidding on Federal Government Contracts Set to Roll Out in 2025
What is the CPCSC? Affected businesses will likely need assistance in achieving certification with CPCSC New legislation expected in 2025 will require companies who wish…
How Cyber Insurance Works
What is cyber insurance? Cyber insurance enables businesses to mitigate the costs that arise from cyber incidents, including ransomware. This type of insurance is essential…
Snowflake breach: What happened?
And could it have been avoided? What happened with the Snowflake breach? 34 million users (already) were recently compromised in a data breach of the…
Cyber Insurance Terms Debunked
When working with clients to submit applications for Cyber Insurance, we often hear that they don’t understand the terminology on the application form. For anyone who…
Some Common Mistakes to Avoid when Choosing an IT Consultant
Obviously, the easiest advice we can give here is to hire Birmingham Consulting Inc. to be your IT consultant. But for people who want a second…
The True Cost of Poor IT Support
No one is exempt from IT problems, but it’s hard to put a dollar figure to the actual hard costs to your business when IT…
Why Bother with Cyber Insurance?
We continue to alert our clients about the increasing need for cyber insurance. Especially when we continue to hear that one of the largest cyber liability…
Cyber Insurance Demands Better Security – Who Knew?
Actioning a new cyber security policy or procedure can be an intense change for a company. Certainly, as a cyber security and technology company, we’ve heard it…
The Cyber Company that Cried Wolf
Sometimes I feel like the little boy who cried wolf, especially when it comes to the latest cyber attacks and breaches. Do people really comprehend…
An AI Wrote this blog
We decided to sit down and ask ChatGPT to write a blog on its threat to cyber security. ChatGPT: (Note that the first thing it…
Are You Hacked But Don’t Know It Yet?
I recently had the privilege of meeting a business analyst from BDC. She shared some not-yet published information from a study BDC conducted. Most statics available online…
We Interrupt This Program…
There are many sites that track current vulnerabilities in the world of cyber warfare. However, this one is severe enough to share with our readers: There…
What is a Tabletop Exercise (TTX)?
A tabletop exercise (TTX) is a method to test the effectiveness of a cyber incident response plan (IRP) by simulating a cyber breach. To be most…
The Cyber Butterfly Effect
In 1972, at the 139th meeting of the American Association for the Advancement of Science, meteorologist Edward Lorenz posed the question “Does the flap of a butterfly’s wings in…
Shameless Self Promotion: The Heritage Of Our Home
Birmingham Consulting has the privilege of conducting business in a historical building within the heritage district of Waterdown, Ontario, at 21 Mill Street North. A…
Cyber Security vs. Cyber Resilience – What’s the Difference?
Is your business cyber secure, or cyber resilient? Cyber security refers to the defensive measures to protect your business against cyber attacks. Think next-gen endpoint protection, spam filtering,…
Why The Kaseya Ransomware Event Will Forever Change the World Of Cyber Security
One of the largest – if not the largest – ransomware events in history took place over the U.S. Independence Day long weekend. A recap: Kaseya, a company…