Most Popular

What’s New?

Can a business invest in stocks?GLEIF’s verifiable LEI issuer qualification programWhat are Child Entities and How do They Relate to Other Entities?Do I need an LEI when selling shares?Business Transparency: How to Create an Environment of TrustAnti Money Laundering (AML) in Banking: Everything You Need to KnowKYC in Banking: Why It’s Important and How to ComplyCorporate Structures Demystified: What You Need to KnowASIC releases a new consultation paper about changes to its derivative transaction rulesWhat is a parent company and how does it work?How long does it take to get an LEI?ISO 5009 – Identifying organizational rolesISO 17442 – Standard for LEI code structureESRB discusses the future of LEILegal Entity Identifier (LEI) vs Tax Identification Number (TIN) in AustraliaWhat documents are required for LEI registration in Australia?Who is an LOU in the LEI Dimension?GMEI vs LEI RegisterLapsed LEI – Why should you keep your LEI active?Who is an LEI Registration Agent?Are LEIs public?What is LEI transfer?Can an individual have an LEI?Who Needs An LEI Number?Do LEI numbers need to be renewed?Why is an LEI number required?How much does an LEI number cost?LEI Lookup – Fully dedicated LEI search websiteISIN to LEI mappingGLEIS | Global LEI SystemMiFID regulation | MiFID II LEIvLEIGLEIF | Global Legal Entity Identifier FoundationCompany Autocomplete by LEI RegisterOpen LEIEuropean Market Infrastructure Regulation | EMIRWhat is an LEI database?Legal Entity Identifiers in CryptocurrencyLegal Entity Identifiers in KYCDigital Identity Predictions for 2020The Future of Cybersecurity – DeloitteLegal Entity Identifiers in Digital CertificatesBroad Adoption of LEIs Could Save The Global Banking Sector US $2-4 BillionLegal Entity Identifiers for Government EntitiesThe European Market Infrastructure Regulation (EMIR) and Legal Entity Identifiers (LEIs)The FCA Will Take Pragmatic Approach to Supervising Reporting on Brexit DayAdoption of LEI in Payment Messages by the Payments Market Practice Group (PMPG)RegTech London – Event SummaryCybersecurity in a NutshellLEI deadline postponed by ASICHow to get an LEI in Australia?What is LEI-Search?LEI Register and RapidLEI Announce Official Partnership

Cybersecurity in a Nutshell


Modern businesses run on data. Unfortunately, our data and networks are more vulnerable than ever. We cannot help but hear the daily news of cyber attacks and the massive problems they create. Even a minor breach creates a significant financial hit for an organization, not to mention the downtime and reputational damage. A major breach can spell disaster.

The Three Facets of Cybersecurity

Most of us know that cybersecurity is important, but we often think of it as a monolithic concept. We may consider the entire concept of cybersecurity as a technical issue to be handled by IT specialists. However, to adequately address and mitigate the risks organizations face, we need to take a more holistic approach to cybersecurity.

We must look at the safety and security of our data and systems through three aspects: the human factor, the technological element, and process management. Without this more complete view, we may think we are handling our data security issues when we are only looking at a part of the problem.

e-Cy is a newly formed group of cybersecurity professionals that take this broader approach. Instead of just one area of expertise, e-Cy has experts that specialize in each of these three facets of cybersecurity: human, technology, and process.

The Human Aspect

It is the human element that makes your business what it is. There is nothing more valuable than the human capital that fuels your organization. However, humans make mistakes. This can be a massive problem when it comes to cybersecurity. Research shows us that 50% of all cybersecurity threats are actually caused by human error. Too often, we are taking only a technological view of improving our security when half the problem may be human error.

This is a problem that we need to address if we want to begin to reduce our cyber exposure. People are the strength of our organization. We need to leverage that strength to create a high level of security rather than allowing our workforce to be the soft spot for cybercrime. This involves education, study, and evaluation to ensure our people are ready to be a part of our security efforts.


Technology is what most people think of when they consider cybercrime. Technological weaknesses can open our valuable data to criminals who are just one step ahead. There are serious questions to address. Is your website bot-proof? Is your data protected by secure passwords? Is your network safe from attacks and free from electronic “backdoors” where cybercriminals can sneak in?

If you run a successful business with valuable data, hackers will try anything to force their way into your systems. They will try different websites, software, and exposed networks. They may even find ways to install malware and take over your devices or network.


You can invest in the best training for your people and insist on the very best technology for your network, but if things aren’t working together, you will continue to be at a higher risk level than necessary. Processes enlist people and tech to ensure every effort is made to keep your organization safe from cybercrime.

Failure to create, evaluate, and maintain clear processes may leave holes through which hackers can enter undetected. Well thought out processes assess how all these things work together and ensure that nothing gets missed.

Focusing on All Three

Cybersecurity is too important and too complicated to handle on your own. Even if you have a talented and dedicated IT staff, you will need help to ensure that there are no vulnerabilities in your people, technology, or processes.

e-Cy offers expertise in all three areas. We don’t just provide cyber-security services. We help identify areas of weakness and then help create a plan to shore up your security and mitigate risk. That may come through training staff in cyber awareness, penetration testing that looks for weak spots in technology or processes, and even comprehensive vulnerability risk management.

Once we begin to see cybersecurity, not as a monolithic topic, but rather through a holistic lens of people, technology, and process, we can truly begin to address the real risk. By considering all of the factors that may put our data at risk, we have the most significant opportunity to reduce that risk and keep our data, and our company safe.