Inside The Ink

How to Identify and Prevent Insider Data Breaches

by Kevin Lancaster

A little known fact about corporate identity theft is that a large percentage of data breaches originate inside the organization’s walls. A recent report by Intel estimates that 43% of data breaches are the result of insider threats. Half of the insider breaches came from employee negligence and half came from malicious actions.

Read More

How to Protect Your Business From Tax Scams

by Kevin Lancaster

Do you think the IRS is protecting your personal information from cyber thieves? Apparently the Government Accountability Office (GAO) doesn’t think so. In a March 2016 report titled, “IRS Needs to Further Improve Controls Over Financial Taxpayer Data”, the GAO found that 28 vulnerabilities that the IRS claimed to have resolved have still not been fixed.

Read More

Are You Protected if Your Supply Chain Gets Hacked?

by Kevin Lancaster

In today’s world, it’s not uncommon for organization’s to have some type of system in place to protect themselves from a potential data breach. Many use secure password protocols, two factor authentication logins and even invest in cyber education for their employees to minimize the possibility of insider breaches.

Read More

5 Ways to Better Secure Your Employees’ Passwords

by Kevin Lancaster

As providers of comprehensive cybersecurity solutions, we’re often asked how an organization can better ensure that their employees are being safe online. There are numerous ways to prevent a data breach, from the implementation of a threat intelligence tool to network security protocols thatscreen your supply chain.

Read More

How to Increase Corporate Security and Employee Productivity with an Identity Monitoring Benefit

by Kevin Lancaster

Protecting employees from cyber threats and identity theft is increasingly becoming a corporate responsibility. Every year, HR and Benefits Managers are faced with the task of simultaneously communicating cost increases and benefit reductions while finding ways to improve employee morale. At the same time, those focused on your corporate security are busy fighting the endless war game of trying to keep bad actors from exploiting their organization for gain.

Read More

Speed: The Crucial Element in Data Breach Detection and Response

by Kevin Lancaster

If you think you’re immune from hackers, consider this USA Today headline from March 25, 2016:1.5M Customers of Verizon Anti-Hacking Unit Hacked. We bring this headline to your attention not to cast aspersions on Verizon, but to illustrate that no organization is immune from hackers.

Read More

It’s Time to Take Stolen Email Credentials Seriously!

by Kevin Lancaster

Are you concerned about hackers stealing your organization’s email credentials and accessing your organizations PII or confidential information? If you’re not, you should be.

Read More

Is Healthcare Cyber Secure? An Infographic

by Kevin Lancaster

Keeping your healthcare organization cyber secure is no easy feat. In fact, almost every organization is vulnerable to a cyber attack, no matter what the industry. Just look at the headlines featuring major breaches to entities like the Federal Bureau of Investigation and the Department of Homeland Security alongside medical institutions like MedStar.

Read More

Winvale Wins ‘Tech Company of the Year’ From Chesapeake Regional Tech Council

by Kevin Lancaster

WASHINGTON, D.C., May 5, 2016 – Winvale, the leading provider of strategic and technology solutions for government, was named Tech Company of the Year by the Chesapeake Regional Tech Council (CRTC) at the organization’s annual awards celebration on April 28, 2016. Winvale was honored for its achievements in strategic business planning, vision and contributions to the Washington, D.C., regional economy.

Read More