Cyber Insurance: What it is & Why You Need it

Cyber Insurance: Your cybersecurity backstop Cyber threats aren’t going away or becoming any easier to address. According to a recent study conducted by Hiscox Insurance, in the past year, 72 percent of large companies in the U.S. have reported at least one attack. Sixty-eight percent of smaller U.S. companies during this same period reported at least […]

Newberry Achieves CMMI Level 3 for Services

Newberry Group, Inc., a Small Business that delivers governance and IT professional services, announced that it has been appraised at Level 3 of the CMMI Institute’s Capability Maturity Model Integration (CMMI)®. We greatly appreciate the support of Integration Technologies Group (ITG) in guiding us to this accomplishment and ACE Guides, LLC for performing the appraisal. […]

Common social engineering scams and how to avoid them

A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply not true. Cyber attackers have learned that often the easiest way to steal your information, hack your accounts, or infect your systems is by simply tricking […]

I’m Hacked. Now What?

Have I Been Hacked?No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and if so, what to do. Your Online Accounts Family or friends say they are receiving unusual messages or invites from you that you know you did not send. […]

Insider Threat: 3 Ways to Mitigate Risk

An insider threat is a security risk that originates from within the targeted organization. Anyone with access to sensitive information can become a threat to the organization, intentionally or unintentionally. Insider threat comes in many forms – it could be a current well-meaning employee who is negligent or unaware, or a disgruntled current or former […]

Creating a Cyber Secure Home

Overview In the past, building a home network was nothing more than installing a wireless router and several computers. Today, as so many of us are working, connecting, or learning from home, we have to pay more attention to creating a strong cyber secure home. Here are four simple steps to do just that. Your […]

Does the ‘Presidential Peloton’ pose a threat to national security?

How devices on the Internet of Things (IoT) complicate security from the White House to your house. Your data may not be quite as prized as, say, the President of the United States, but hackers love low-hanging fruit. In other words, although you might not have national secrets hiding in your Peloton, it doesn’t mean […]