Services: Enterprise Risk Management

Web Ranking: How Do You Measure Up?

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     While web ranking is not necessarily a security concern, having insight into the popularity of your website helps measure the success of ad campaigns, assess visitor engagement with your content, and identify opportunities for growth. Web ranking sites include Alexa, Cisco, and Majestic, and each site…

Read more ›

Fraudulent Applications: Are Attackers Pretending to be You?

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     When downloading a new app, be sure it’s from a credible source. Hackers can create fraudulent applications that look very similar in name or appearance to well-known apps. To make matters worse, these fake apps can sometimes be found on trusted sites like the Apple or…

Read more ›

Fraudulent Domains: Are You a Victim of Typosquatting?

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     Fraudulent domains look very similar to your organization’s domain name and are used to fool people into thinking they are interacting with you. These domains are often used in phishing attacks, which according to CSO Online, account for more than 80% of all reported security incidents….

Read more ›

Keep Cybercriminals from Stealing Your Business’s Brand

When criminals steal an individual’s identity, the victim can take steps to minimize potential damage by, for example, notifying credit agencies and freezing bank accounts. But what happens if a cybercrook steals a company’s identity and uses it to engage in fraud? This situation can be more complicated — and expensive — to resolve. Fraudsters who…

Read more ›

GRF’s Darren Hulem Earns Designation of Certified Ethical Hacker

GRF CPAs & Advisors (GRF) is pleased to announce that IT and Risk & Advisory Services Supervisor, Darren Hulem, CISA, CEH, Security + has successfully completed all requirements and criteria set forth by the EC-Council for designation as a Certified Ethical Hacker (CEH). Holders of the CEH certification understand how hackers think and are trained…

Read more ›

DNS Health: Ensure your organizations’ identity is protected

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     Your organization’s domain name (e.g. “example.com”) serves as the base of operations for your online identity – helping interested parties to find you and connect with you online. However, the underlying machine language of the internet is based on numbers. Every site on the internet has…

Read more ›

Network Security: Building Resiliency

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     It’s not just about disruption or inconvenience. A compromised technology incident can have a detrimental impact on your organization’s processes, mission, and reputation. A review of your external network security risk should include looking at any risk that is related to your perimeter network – or…

Read more ›