Centry Blog: 2017 in Review

pexels-photo-285173

As of this month, Centry Blog has been in production for one year!

Over this period of time, we have published weekly entries on a variety of subjects ranging from Cyber Security, informational security, data breaches, social media, phishing, history, to geopolitics and more.

In honor of that, we’ve put together a list of some of our most-read articles written over the course of 2017:

JANUARY

Website Creation. These were the earliest days of setting up Centry Blog and refining its look before publishing content for our readers.

FEBRUARY

The Value of Secure Logistics Supply Chains 

What is the cost of unsecured supply chains? Is it a price your organization is willing to pay? Learn more about common ways supply chain security can be compromised, and how to address the issue.

MARCH

Spies in History: The Story of Elizabeth Bentley

Elizabeth Bentley was a Soviet spy in the United States between 1935-1945, until she famously defected from the USSR and gave testimony before the House Committee, wherein she named more than eighty associates in her network– some of whom held positions in the government of the United States. Her story was but one in the mounting tensions after World War II that began to pave the path to the Cold War, but her impact certainly was remarkable.

APRIL

When Due Diligence Fails

When does mediocre effort become detrimental? In due diligence, there are three certain ways: insufficient information, lack of verification, and disregarding red flags. Let this article be a lesson in what not to do, and learn from the mistakes of real world examples.

MAY

Spies in History: Virginia Hall, The Most Dangerous Allied Agent in France

Another installment in the Spies in History series, this article reviewed the story of Virginia Hall, a little known hero of World War II. Among other achievements, Virginia Hall was responsible for helping to organize, fund, supply and arm the French resistance during Nazi occupation.

JUNE

Hook, Line, and Sinker: Phishing on Social Media

Phishing attempts have grown to be tailored around their individual social media platforms. This article illustrates these attempts across various platforms such as Facebook, Twitter, Tumblr, and Instagram, and gives tips on how to identify scams.

JULY

A Quick Guide to Anti-Corruption and Bribery

Bribery and corruption are significant issues that entrepreneurs and businesses may encounter worldwide. Violators of anticorruption laws and regulations may face the possibility of financial sanctions, crippling fines, and massive reputational damage. When companies are caught in corruption or bribery, it is usually not a quiet settlement, rather their story becomes a cautionary tale for all others…

AUGUST

Are Your Phones Protected?

In the Cyber era, companies have been investing heavily into their data infrastructure, protecting information vaults, CRM databases and critical production management systems. But when is the last time someone took a look at the customer service center IP phone server? How about the phone bills accumulated by the desktop phones of the call center or personal office phones? Those same phones might be still on your desk, but you have not used them in months or even years.

SEPTEMBER

When VPNs Go Wrong

VPNs have become widespread over the past few years as their users have expanded from businesses utilizing them for information security to individuals seeking out ways to bolster their privacy or obscure their location. The issue that arises from growing individual use is that there are more opportunities to be scammed, and some people with VPNs for personal use may not be able to distinguish between a reputable service and a charismatic, albeit malicious scam. Read on for some red flags to look out for when considering a VPN service!

OCTOBER

Travel Risk Management

Most of the time, trips carry on as expected with maybe a small hiccup in conveniences here or there. But what happens when things go really wrong? Any number of situations could arise with permanent consequences – do you or your organization have a plan for this? This article answers some of those questions by outlining key risks to consider before traveling.

NOVEMBER

Unraveling the Equifax Data Breach

The Equifax Data Breach dominated headlines for weeks after news of it first came out. This article examines how it happened, what went wrong in the aftermath, and what people affected by it can do.

DECEMBER

When is ‘State-Owned’ a Red Flag?

One of the things that we screen for in our risk assessments is the connection of the subject to a politically exposed entity. This basically refers to any individual or company that has connections to the government of a country or other public office. For someone unfamiliar with screening processes and typical red flags, you might ask – when does political exposure or state ownership become a red flag?

 

 

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s