ACCESS THE LATEST AUTOMOTIVE INDUSTRY NEWS RIGHT HERE!
4 Critical Data Backup Best Practices
Backups provide dealerships with the ability to recreate data impacted by a ransomware attack or other malicious threats. Today, it is critical that all dealerships have data backup best [...]
Trouble Getting Cyber Liability Insurance?
For businesses of all sizes, the threat and financial impact of a cyberattack is rising. Many businesses are looking to cyber liability insurance to help. But the increasing demand [...]
A Warning About Pen Tests
Pen tests are valuable - if you have the appropriate expertise to fully understand the findings and then take action to address the vulnerabilities identified. However, pen tests are [...]
The FTC Safeguards Rule – Is There A Magic Pill?
There’s a great deal of interest and confusion among dealers regarding the new FTC Safeguards Rule. When working on compliance with the Rule, it’s helpful to remember the intention [...]
How’s Your Cybersecurity Hygiene?
Cybersecurity hygiene is a set of habitual practices that you perform regularly to maintain the health and security of users, devices, networks, and data. It’s like brushing your teeth. [...]
The IT & Cybersecurity Skills Crisis; A Growing Issue For Dealerships
Today, there is an IT/cybersecurity skills crisis. Gartner predicts that this skills crisis could cause 75% of businesses to experience visible disruptions. This means, the inability to perform business [...]
Steps To Performing A Cyber-Risk Assessment
The FTC Safeguards Rule now requires that dealerships perform an annual cyber-risk assessment. This requirement shouldn’t be viewed as just another government regulation that is a big hassle with [...]
Rising Above The Cybersecurity Poverty Line
The cybersecurity poverty line is a term used to understand your dealership’s cybersecurity shortfalls and what needs to be done to level-up and enhance your cybersecurity posture. The line [...]
Cybercriminals Use Privilege Escalation; Here’s What You Need To Know
Privilege escalation is when a malicious user gains elevated access to resources they are not authorized to access. This happens when a cybercriminal exploits a bug, design flaw, or [...]