GRF CPAs & Advisors (GRF) is pleased to announce that IT and Risk & Advisory Services Supervisor, Darren Hulem, CISA, CEH, Security + has successfully completed all requirements and criteria set forth by the EC-Council for designation as a Certified Ethical Hacker (CEH). Holders of the CEH certification understand how hackers think and are trained…
The Homeland Security Cybersecurity Infrastructure Security Agency (CISA) has warned Russia’s unprovoked attack on Ukraine, which has involved cybersecurity attacks on Ukrainian government and critical infrastructure organizations, may impact organizations both within and beyond the region. Every organization regardless of size should be prepared to respond to a cyber-attack. Take Proactive Steps Now There are some simple steps…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your organization’s domain name (e.g. “example.com”) serves as the base of operations for your online identity – helping interested parties to find you and connect with you online. However, the underlying machine language of the internet is based on numbers. Every site on the internet has…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series It’s not just about disruption or inconvenience. A compromised technology incident can have a detrimental impact on your organization’s processes, mission, and reputation. A review of your external network security risk should include looking at any risk that is related to your perimeter network – or…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your website is essential for promoting your nonprofit organization’s mission. However, bad actors often target nonprofit websites for attack, assuming they are not as protected as commercial sites. One hacker strategy is to bring the site down entirely through a denial of service attack. That’s where…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your email is a critical business function that needs to be constantly available and secured. Securing your email systems involves looking at the configuration of your email server, your mail exchange (MX) records, and SMTP (Simple Mail Transfer Protocol) to identify any potential vulnerabilities or misconfigurations….