Cybersecurity Resources

Take advantage of our resources, including case studies, news and expert thought leadership, to stay apprised of current cybersecurity trends.

To view the entire Our Thoughts On cybersecurity blog catalog visit our archive.

Category
IT Risk Advisory
Service Overview – SOX
Events
Webinar: How to Secure Student Records and Comply with GLBA
Quick References
Article - Security Info Watch - Lincoln College Closure a Testament to the Threat Posed by Ransomware

David Murphy discusses the importance of having a good disaster recovery plan and the investment in vulnerability management tools in an article with Security Info Watch regarding Lincoln College closure.

Quick References
Article – Financial Planning –Remain on Alert for Russian Financial Cyber Attacks

David Murphy provides insight to Financial Planning about the importance of basic cybersecurity practices.

Quick References
Article - DOE Significantly Expands Definition of Third-Party Servicer in New Guidance to Higher Education Institutions

Learn more about the Department of Education recently expanding the definition of Third-Party Servicer in relation to the Title IV of the Higher Education Act of 1965.

Videos
Big Thinking, Personal Focus: Cybersecurity

Learn how big thinking and personal focus drive client success.

Service Overviews
IT Risk Advisory Overview
Quick References
Guide - CMMC Frequently Asked Questions

Learn more about frequently asked questions from authorized resources and professionals regarding cybersecurity Maturity Model Certification (CMMC) engagements.

Events
Webinar: How to Recover from a Cyberattack, presented by the Chronicle of Higher Education
White Papers
Securing a Remote Workforce

Learn about best practices to secure a remote workforce including critical infrastructure considerations, cyber incident preparation and themed attack mitigation.

Quick References
Guide - CMMC Preparation Checklist

Be better prepared with your Cybersecurity Maturity Model Certification (CMMC) engagement using our preparation checklist.

Service Overviews
Purple Team Assessment Overview
Quick References
Article - Tech Republic - Security alert: Use these most popular passwords at your peril

Cybersecurity Shareholder Carl Kriebel discusses how to strengthen password security with Tech Republic.

White Papers
Staying Secure From Home

Learn about the best practices organizations and individuals can take to mitigate risks in an increasingly remote world.

Quick References
Guide - Key Changes in PCI DSS V4.0

Learn about key changes in the Payment Card Industry Data Security Standard v4.0.

Quick References
Article – Pittsburgh Business Times Cyber-Breached Panel
Quick References
Article - Secrets Revealed: What Your Third Party Auditors Don’t Want You to Know

Learn about the most important considerations to make when working with third-party IT auditors for IT security.

Quick References
Guide - 7 Best Practices to Keep Your Home Network Safe

Learn how to layer and maintain defensive security measures to protect your assets from digital intruders.

Quick References
Infographic - Types of Personal Data

Learn about the different types of personal data targeted by cybercriminals.

Quick References
Article – Cybersecurity Dive – Banks Face 'Tight Deadline' Under New Cyber Notification Rule

David Murphy discusses the FDIC’s Computer-Security Incident Notification Final Rule with Cybersecurity Dive.

Events
Webinar: Managing Cloud Vendor Risks
Service Overviews
Penetration Testing Overview
Quick References
Guide - 10 Must Ask Cybersecurity and Information Security Questions
Quick References
Article – Directors & Boards – Boards and Management Must Work Together to Strengthen Cybersecurity

Schneider Downs' Carl Kriebel discusses the importance of management and boards closing communication gaps to strengthen cybersecurity.

Quick References
Article – WAND – Ransomware, Pandemic Brought Down Lincoln College
Events
Webinar: Cyber Insurance: 2022 and Beyond
Our Thoughts On
A First of Its Kind: The $25 Million Deepfake Scam

Learn how scammers used a deepfake attack to steal more than $25 million from a multinational firm.

White Papers
10 Things Companies Wish They Did Before a Breach

Learn about ten key preventive measures companies have overlooked prior to a breach.

Case Studies
Global Manufacturer Operations Halted By Ransomware Attack
Quick References
Article – Pittsburgh Business Times – Remote Workforce Security Tips
Quick References
Article - The IT Nerd - Cyber Thieves Can Wreak Holiday Havoc: How to Avoid these Scams

Cybersecurity Shareholder Carl Kriebel discusses three of the most common scams targeting online holiday shoppers this year with The IT Nerd.

Quick References
Article – CSO Online – What is Your Biggest Insider Threat?

David Murphy shares his insights with CSO Online on some of the most problematic insider threats and minimizing their risk.

Quick References
Guide – Understanding the Security and Privacy Concerns of TikTok

Learn what data TikTok users share, with whom that information is being shared and why the platform is considered by many as a security risk.

Case Studies
Case Study: Company Impacted by Six-Figure Ransomware Attack
Quick References
Article - How Third Party Risk Management Caters to Your Organization

Learn more about what your third-party risk management team does every day to keep your organization safe.

Quick References
InfoSec Policy Templates
Videos
Chronicles of a Penetration Tester

Lead Cybersecurity Strategist Stephen Bish shares his adventures as a penetration tester.

Events
Webinar: 10 Vulnerabilities Hackers Love to Exploit
White Papers
10 Most Common Physical Cybersecurity Threats

Learn about some of the top physical cybersecurity threats facing organizations and best practices for mitigating physical security risks.

Quick References
Infographic – 10 Steps Contractors Can Take to Reduce Cyber Attacks

Learn ten key steps contractors can take to strengthen their cybersecurity defenses.

Our Thoughts On
Fortifying Retail Security: Essential Cybersecurity Tools and Software

Explore essential cybersecurity tools and software that are indispensable for securing the retail industry

Quick References
Guide – Compliance and Third Party Risk Management
Quick References
Article - Pittsburgh Post Gazette - Ask Me About... How the Shutdown of a Small College Brings Home the Danger of Ransomware

David Murphy speaks with the Pittsburgh Post-Gazette regarding the recent ransomware attack that shut down Lincoln College.

Videos
Top Cybersecurity Questions of 2021

Join the Schneider Downs Cybersecurity team as they answer some of the most common questions they have faced in the field from 2021.

Quick References
Infographic - Top Disguises Used to Breach the Office
Service Overviews
Third Party Risk Management Services Overview
Service Overviews
CMMC Service Overview
Our Thoughts On
Tis the Season: Unwrapping the Top Holiday Scams of 2023

Learn about some of the top online scams circulating this holiday season.

Service Overviews
Cybersecurity Services Overview
Service Overviews
Ransomware Security Overview
Service Overviews
PCI DSS Service Overview
Our Thoughts On
Postcard from the 2023 ISACA Pittsburgh Information Security Awareness Day

Explore some of the key takeaways from the 2023 ISACA Pittsburgh Information Security Awareness Day conference.

Videos
Cybersecurity Tips from Home Series
Quick References
Article – CNN – US Warns Businesses to Prepare for Russian Cyberattacks. Here's How They Can Do That

Schneider Downs' David Murphy discusses cyber insurance and potential Russian cyberattacks.

Our Thoughts On
Defend Your Dollars and Data: How to Avoid IRS Impersonation Scams

Learn more about how to identify and avoid IRS impersonation scams this tax season.

Quick References
Guide - Automotive Dealerships and the FTC Safeguards Rule

Learn about the new compliance requirements outlined by the updated Federal Trade Commission Safeguards Rule for automotive dealerships.

Events
Webinar: Inside Web Application Penetration Testing
Case Studies
Employees’ Passwords Compromise Cybersecurity Defenses
Videos
Why IT compliance strengthens and protects your business

Manager of Risk Advisory Services, Timothy Wolfgang, joins the PGH Networks to discuss why IT compliance strengthens and protects your business.

Quick References
Article – Schneider Downs Named PTC Tech 50 Cybersecurity Innovator of the Year
Quick References
Article - The Top Ten Most Common SOC 2 Exceptions

Learn about the most common SOC 2 exceptions the Schneider Downs team have encountered.

White Papers
Benefits of a Purple Team Assessment

Learn more about the benefits of extending your basic penetration testing using Purple Team assessments to help you improve the organization’s alerting and detection posture.

Quick References
Article – HowStuffWorks – Have You Been Zoom Bombed?
Our Thoughts On
10 Cybersecurity New Year's Resolutions for 2024

Strengthen your cybersecurity defenses in 2024 with these ten tips from the Schneider Downs cybersecurity team.

Videos
Top Cybersecurity Questions of 2022

The Schneider Downs Cybersecurity team shares some of the top questions they have faced from clients in 2022.

Quick References
Article – WAND – Ransomware, Pandemic Brought Down Lincoln College

Sean Thomas discusses the role a ransomware attack played in the permanent closure of Lincoln College.

Quick References
Article – VentureBeat – Why the U.S. Can Engage Russia on Cyber Over Ukraine

Schneider Downs' David Murphy provides insight on how the issues in Ukraine create implications in US/Russian relations.

Quick References
Article - Proposed Interagency Guidance on Third-Party Risk Management

Learn about the new jointly proposed guidance on Third Party Risk Management from the OCC, FDIC and Board of Governors of the Federal Reserve System.

Quick References
Article – Pittsburgh Business Times – Carl Kriebel Joins Schneider Downs

Carl Kriebel joined Schneider Downs & Co. Inc. as a shareholder and is based at its downtown headquarters.

Our Thoughts On
Squish the Quish – Stop and Think Before You Access a QR Code

Learn more about QR code phishing attacks and how to protect yourself from this rising threat.

White Papers
Maximizing the Value of Penetration Testing

Learn about penetration testing including our methodologies, and best practices to help your organization maximize the value of this assessment tool.

Quick References
Article – S&P Global – Small Banks Could Face Challenges With 36-Hour Cyber Reporting Rule

David Murphy discusses why smaller banks may struggle with the FDIC 26-hour cyber reporting rule.

Service Overviews
Digital Forensics & Incident Response Overview
Quick References
Article - Government Technology - Cyber Analyst Q&A: Security Lessons from Lincoln College

David Murphy discusses cyber attack vulnerabilities and what colleges can do to mitigate them.

Our Thoughts On
Ensuring Network Security in the Retail Industry: A Crucial Imperative

Learn more about the need for robust network security in the retail industry and discover effective strategies for enhancing it.

Quick References
Article - Shared Assessment SIG Questionnaire – What’s New for 2023?

Learn about some of the key changes to the Shared Assessments 2023 Standardized Information Gathering (SIG) Questionnaire.

Quick References
Article – Search Security – Cyber Insurance Premiums Skyrocket

Schneider Downs' Stephen Bish discusses Cyber insurance premiums with TechTarget, as costs skyrocket due to attacks surge.

White Papers
10 Vulnerabilities Hackers Love to Exploit

Get inside the mind of a hacker to learn about underlying circumstances leading to breaches and best practices to mitigate these risks.

Our Thoughts On
Comcast Xfinity Breach Impacts Nearly 36 Million Customers

Learn more about the Comcast Xfinity breach that exposed login credentials of 35.8 million customers.

Quick References
Article - WTAE-TV ABC 4 - How to protect yourself from online shopping scams

Cybersecurity Shareholder Carl Kriebel sits down with WTAE-ABC Pittsburgh to discuss some of the most popular scams targeting holiday shoppers and how to avoid them.

Events
Webinar: Benefits of a Purple Team Assessment
White Papers
Cybersecurity Maturity Model Certification (CMMC) Guide

Learn about CMMC, including a deep-dive into the certificate framework, the certification process, potential costs and best practices for preparing your organization.

Breached?

Every moment counts. For urgent requests, contact the Schneider Downs digital forensics and incident response team at 1-800-993-8937. For all other requests, please complete the form below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.