Blog

  • Patch Management Best Practices

    Patch Management Best Practices

    Cybersecurity threats are constantly escalating and the current landscape means the majority of successful cyber attacks exploit well-known vulnerabilities that can lead to system breaches and loss of sensitive information.  The time between discovery of a system vulnerability and the start of malicious exploits is getting shorter, often a matter of hours before attempted attacks. Increasingly complex enterprise networks, use of bring your own device (BYOD) and other protocols for higher productivity, and the broader array of applications and devices leveraged for business use also provide a larger target for compromise.

    (more…)

  • IT Security Frameworks: What You Need To Know

    IT Security Frameworks: What You Need To Know

    Keeping hackers, cybercriminals, and malicious actors out of your critical systems is a constant battle. But just like any king might defend his castle, you need some kind of overall plan to seal off all the entry points that hackers might look to exploit. Which is exactly why having an Information Technology (IT) security framework is so important.

    (more…)

  • Cyber Security Awareness Training Topics

    Cyber Security Awareness Training Topics

    There are many things that put your network at risk. The primary thing people tend to think about is “The Bad Guys.” Hackers. Corporate espionage. Saboteurs. There is also the concern of physical risks like fire, flooding, and earthquake. You may be surprised to learn that the number one risk to your network, by a lot, is your own employees.

    (more…)

  • Cyber Security Training For Employees

    Cyber Security Training For Employees

    Having a solid cybersecurity defense plan is arguably just as important as having a robust offense.  Case in point, a recent Experian report found that nearly two-thirds (66%) of the data protection and privacy training professionals that were surveyed labeled their employees as the weakest link when attempting to safeguard their organization from cyber threats.  Even though tedious cybersecurity tasks are becoming automated, it’s still best to provide online security awareness training for employees to prevent future issues for your company’s security.  Being prepared when that time comes is paramount to the continued success of your organization and requires that an ironclad training program be conceptualized and implemented before threats become breaches.  With this in mind, let’s review the importance of cybersecurity awareness training and how you can build an organization that is compliant and focused on defending against cyber threats.

    (more…)

  • Cybersecurity Awareness Training?

    Cybersecurity Awareness Training?

    Cybersecurity in today’s world is much more than just enabling your firewall or downloading the latest malware patch. The amount (and complexity) of systems, software, and technologies that companies of all stripes now use makes it imperative that all employees, top-to-bottom, are aware of the cybersecurity risks of all their day-to-day activities.

    (more…)

  • What Are the Different Managed Vulnerability Services Available?

    What Are the Different Managed Vulnerability Services Available?

    At some point, every business has to ask the questions. How safe is my network and the data I have stored on it? How will it affect my business if there is a breach or data loss? How will I recover in either event? How well do I even understand these issues?

    (more…)

  • How To Choose The Right Approved Scanning Vendor For Your Company

    How To Choose The Right Approved Scanning Vendor For Your Company

    Making the choice for an approved scanning vendor (ASV) is an important consideration for organizations looking to achieve or maintain compliance with the Payment Card Industry (PCI) requirements. The requirements set forth in the PCI Data Security Standards (PCI DSS) are intended to provide end-to-end security for cardholder data. A central component of the PCI DSS is the requirement for entities covered by the PCI DSS to have regular external scans of their networks and systems. As such, PCI approved scanning vendors occupy a central role in ensuring that organizations covered by PCI DSS achieve and maintain compliance advisory services with these requirements over time.

    (more…)

  • What are the PCI ASV Scanning Requirements?

    What are the PCI ASV Scanning Requirements?

    The process of understanding the entirety of what Payment Card Industry Data Security Standards (PCI DSS) covers is an extremely daunting task for business decision makers.  An increasingly important aspect of Payment Card Industry (PCI) compliance has become maintaining compliance with the Approved Scanning Vendor (ASV) requirements notated within PCI DSS.  One of the notable requirements that entities must adhere to are those that cover ASV Scans. These vulnerability scans are quite complex in nature and require many man hours of preparation on the vendor and company side to ensure proper consumer payment card protection in the organization’s cardholder environment.

    (more…)

  • ASV Scanning Responsibilities

    ASV Scanning Responsibilities

    You have determined that you need vulnerability scanning from an approved scanning vendor (ASV), probably because you need to maintain or establish PCI compliance. Most businesses require at least quarterly scanning. You have done your research and selected a vendor, verified they are approved on the PCI website and are ready to get started. There are several parties involved in this process from the Card Brands to the merchant and the ASV. We will discuss the responsibilities of each.

    (more…)

  • Overview of the FISMA Certification and Accreditation Process

    Overview of the FISMA Certification and Accreditation Process

    Source: Kaspersky Lab Daily

    When your grandparents used to lament about security or warn you to lock your doors at night that was as far as the concept of “security” went. No one thought an intruder could penetrate a location without physically breaking down doors. Yet today, bank robbers can steal millions of dollars from the comfort of a desk chair. On a household level, this unauthorized accessibility sounds concerning, but when considered by government agencies, the threat is terrifying. While average households possess a small amount of valuable information, governments store millions of records, usually of a sensitive nature. Realizing the potential implications of remote threats, the U.S. Government developed a set of cyber security guidelines called the Federal Information Security Management Act (FISMA). Are you looking to achieve FISMA compliance? Continue reading for an overview of the FISMA certification and accreditation process.

    (more…)