by John Bruggeman | Nov 19, 2021 | Blog, Security
Many companies these days either have cyber insurance or are thinking about purchasing it. It’s a smart choice given recent ransomware attacks and the risk to a company locked out of its critical business systems or important business files for hours or days or weeks....
by John Bruggeman | Oct 22, 2021 | Blog, Security
Since we are in the middle of Cybersecurity Awareness Month, I want to know about your incident response plan or IRP. When you created your cybersecurity program, how did you go about developing an incident response plan for your information security team? What steps...
by Justin Hall | Oct 11, 2021 | Blog, Security
Merry Cybersecurity Awareness Month! It’s going well, isn’t it? I think we are collectively more aware than we’ve ever been about the risk we face, as consumers and also as professionals. Why do so many individuals and businesses live in fear of cyber attacks? Many...
by John Bruggeman | Oct 8, 2021 | Blog, Security
One of the many buzz words in Information Security media today is Zero Trust Networks or ZTN. I like a good acronym as much as the next person (it is easier to type for sure), but it can be hard to understand how you as a CIO can implement a ZTN. In a sense, a ZTN is...
by John Bruggeman | Sep 27, 2021 | Blog, Security
In my previous blog post I talked about the value of centralized logging, a high level, non-complex overview of how centralizing your logs can help you determine if your controls/defense tools are working. Now I will go a bit deeper with some best practices regarding...
by John Bruggeman | Sep 14, 2021 | Blog, Security
In my previous blog post I talked about the MITRE ATT&CK framework and how it helps you determine possible threats and threat actors’ techniques so that you can better focus your limited resources on the more likely threats. The next question you might have is,...
Recent Comments