What’s New

Pathway Forensics Voted Best in Texas for 11th Straight Year

Pathway Forensics, a subsidiary of Briggs & Veselka Co., was once again voted among the best of the best by Texas Lawyer Magazine, an accomplishment the firm has achieved in each of their relevant categories since the list’s inception more than a decade ago.“We’re so pleased to be recognized for the 11th year in a row. It’s a real testament...

read more

Utilizing Outsourced Services to Manage Risk

How to get the most out of your expert service providers.Addressing your business goals can be daunting, especially if you’ve had to make tough financial decisions or even when you’re poised for growth. In most cases, particularly at small and mid-sized organizations, you likely don’t have the headcount to easily make things...

read more

Cybersecurity Tips and Best Practices for Today

Using yesterday’s cybersecurity lessons to prepare for tomorrow.With so many employees working remotely and all of the operational changes the COVID-19 pandemic caused, every business was – and will continue to be – exposed to a new layer of cyber threat as part of our “new normal”. Now is the time to revisit your cybersecurity...

read more

Data Classification: A Quick Start Guide

How to better protect your data through proper identification.Do you know what data your organization creates, processes, and/or stores, plus where all that different data lives within your organization? If you don’t, you’re not alone.Many organizations create, process, and store all kinds of data every day, but do not have a formal...

read more

But Really, What is Ransomware?

Discover the past, present, and possible future of this costly cybersecurity trend. Everyone has heard the term “ransomware” and knows that it’s definitely not a good thing. But do you really know what ransomware is? Quick Explanation Ransomware is malicious software that encrypts the user’s files after being installed without the...

read more

Are You Prepared to Defend Against Ransomware Attacks?

Ransomware attackers don’t care who you are or what data you have. They only care that you need the data – whether its family photos on your phone or your organizations’ client information – and that you’re willing to pay for its safe return. Therefore, all individuals as well as organizations, from for-profit to non-profit, from...

read more

What to Do When a Ransomware Attack Occurs?

Start defining how to handle major aspects of a cyber incident response plan. The worst has happened – you discovered your machine, or even your entire network, has been infected with ransomware. Now what? Everyone hopes their defenses will properly protect them, but you must also be ready to deal with a ransomware infection as part...

read more