Protecting our clients' data & best interests since 1988.
A formal Business Impact Analysis (BIA) gives leaders a clear, data-driven view of which services, processes, and dependencies matter most during disruption. By tying BIA to frameworks like NIST SP 800‑34 and the NIST Cybersecurity Framework, and by partnering with an independent advisor such as JANUS Associates, organizations can transform continuity plans into resilient, executable strategies and build a defensible cyber risk posture
Starting October 1, 2026, Connecticut’s new bill, Raised Bill No. 117, will require organizations to hire outside forensic experts and submit a detailed report to the state if they discover a data breach affecting at least 100,000 Connecticut residents. This only applies to Connecticut residents and excludes non-CT residents. For organizations across the U.S. handling Connecticut resident data, a single large breach could trigger Connecticut’s requirements regardless of location.
Cybersecurity in 2025 moved decisively from “advanced persistent threat” to “always-on, AI-enabled risk,” especially for regulated, security‑sensitive sectors. Executives planning for 2026 should treat cyber as an integrated business risk discipline, not a series of point technology decisions.
Ransomware readiness means putting the people, processes, and controls in place so that when, not if, a ransomware event occurs, your organization can contain the damage, recover quickly, and meet regulatory obligations with confidence.
Insider threats have emerged as a top concern for small businesses and organizations, posing complex risks that technology alone cannot solve. Recent CISA advisories underscore a troubling pattern: attackers misuse legitimate credentials, often without triggering suspicion until significant damage has occurred.
With smaller teams, older technology and fewer resources, small businesses face an increased risk of cyber attacks. In fact, 50% of cyber attacks target small businesses. Small businesses also have a more difficult time recovering from a cyber attack - 60% will close within six months following a cyber security incident. Here are some common tactics cyber criminals use, and ways to strengthen your business’ cyber security: