SQ Risk Third-Party Risk Management as a Service

Third-Party Risk Management (TPRM) is a complex process that presents several challenges for organizations. Creating a comprehensive vendor risk management policy that is both effective and adaptable to the changing landscape of third-party relationships is a challenge that organizations must continuously address to safeguard their operations and data. Another difficulty is effective ecosystem mapping, which […]

Making Cyber Intelligence Actionable and Relevant

Making Cyber Intelligence Actionable and Relevant Cyber intelligence is a vital asset for any organization that wants to protect its data, systems, and assets from cyber and physical threats. Cyber-intelligence can also be useful to anticipate risk associated with critical third parties. Working with the right cyber-intelligence provider is the first step for securing this […]

Cyber Hygiene and Security Awareness

Cyber Hygiene and Security Awareness In today’s digital world, no organization is safe from cyber threats. Hackers are constantly looking for ways to exploit vulnerabilities and steal data. They use different methods and techniques to launch their attacks, and they keep evolving their skills and tools. That’s why every institution must practice good cyber hygiene […]

SQ Risk presented Putting the Management in Business Continuity

SQ Risk presented Putting the Management in Business Continuity Tuesday, June 9, 2020, SQ Risk, Managing Partner Larry Augustine presented “Putting the “Management” in Business Continuity”. The webinar session was part of an educational series sponsored by Specialized Data Systems for the National Consumer Reporting Association.   The SQ Risk Business Continuity Management (“BCM”) presentation […]

An ounce of prevention…

I reflected today on Benjamin Franklin’s quote, and even now, it couldn’t be truer; “An ounce of prevention is worth a pound of cure”. Looking back at 2017 and 2018 we saw the barrage of breaches continue. We also see that cybersecurity threats such as malware, ransomware, and crypto mining continue and are becoming more […]