Blog

  • Does Your Company Need an MSSP?

    Does Your Company Need an MSSP?

    Cyber security today is an existential requirement for all companies. Cyber security threats targeting key assets, personally identifiable information (PII), or with the goal of encrypting and ransoming access to sensitive data are all increasing in both frequency and sophistication. In order to combat existing and emerging threats, cyber security professionals have had to implement significant operational and organizational changes. In many cases, companies have chosen to rely on a managed security service provider (MSSP) or remote IT security services to maintain their cyber security defense.

    (more…)

  • Your Third-Party Cyber Risk Assessment Checklist

    Your Third-Party Cyber Risk Assessment Checklist

    In today’s cybersecurity landscape, keeping data secure isn’t just about the measures that your business or organization takes to keep hackers out. With the rise of cloud computing, software-as-a-service, and other third-party vendors and services that require sensitive data sharing, the cybersecurity risk is now shared across various parties, platforms, and systems. Which is why comprehensive cyber risk assessment needs to include any and all external third parties that handle sensitive, confidential, or proprietary data.

    (more…)

  • What Is Threat Intelligence Monitoring?

    What Is Threat Intelligence Monitoring?

    Threat intelligence monitoring is a an important tool that managed security services providers (MSSP) or remote it security service providers use as part of a comprehensive cybersecurity strategy. Despite its widespread use in the cybersecurity industry, threat intelligence monitoring solutions remains an obscure concept for most people. In this article, we’ll break down what threat intelligence monitoring is, how it is helpful, and how it fits into a cybersecurity risk management strategy. This information will highlight the important role that cybersecurity monitoring plays in safeguarding against advanced persistent threats (APT) and emerging threats.

    (more…)

  • The Importance of Having a Web Application Vulnerability Management Plan

    The Importance of Having a Web Application Vulnerability Management Plan

    With the Internet, anything is possible, at least that’s how it appears. However, the real power behind much of the Internet came to fruition with the rise of web applications in the late 1990s. Although web applications existed before the 1980s, they evolved into much more complex programs by the turn of the century and have progressed even more with mobile devices.

    Now, new applications launch every day; some become obsolete and die, and some launch and dominate the market. The G-Suite alone, Google’s popular set of applications, provides numerous services from email to documents to spreadsheets to schedules. Yet, with the rapid turnover rate and high traffic/usage of such apps, security sometimes takes a back seat. A 2015 study found that almost all of the participants had experienced a Web Application breach within only one year.

    As threat awareness increases, web security researchers and industry leaders hope more entities will implement an action plan for securing the web application environment. Do you know the importance of having a web application vulnerability management plan in place for your company? Read on to find out more.

    (more…)

  • Understanding The Basic Components of Cyber Risk Management

    Understanding The Basic Components of Cyber Risk Management

    Whether you’re a bank that handles sensitive financial information, or a medical provider handling confidential health data about patients, odds are that you face cybersecurity threats in some way, shape, or form. Whether it’s hackers, malware, or viruses designed to steal valuable data, it’s imperative that every business have a handle on what risks they face, and work within a framework to guard against them.

    (more…)

  • Vulnerability Management From An MSSP

    Vulnerability Management From An MSSP

    Vulnerabilities in a company’s network are bad news if they get out of hand.  Even if your team manages to catch a vulnerability that hasn’t yet affected your infrastructure, you might not be able to patch the vulnerability in time due to your current manpower.  If this is where your organization is at currently or may be headed in the future, you’ll need to consider having a managed security service provider (MSSP) close your vulnerability gaps in your network infrastructure.  This may be a tough decision to make, but we’ll do our best to give you the pertinent information that you need to make the most informed decision on integrating the remote it security services of an MSSP into your organization.  This article will also touch on MSSP roles, responsibilities, and best practices to give you a well-rounded understanding of what to expect once the MSSP is onboard.

    (more…)

  • What Is Managed Detection and Response (MDR)?

    What Is Managed Detection and Response (MDR)?

    It’s no secret that global cyber threats are increasing both in volume and sophistication with each passing year. Some estimates even predict that the total cost of global cyber crime damage will hit $6 trillion annually by the year 2021. Which is why companies, brands, and organizations across the board are enlisting help from third party vendors and partners in their cybersecurity solutions efforts, leading to the the recent rise of the Managed Detection and Response (MDR) model.

    (more…)

  • Benefits of Being NERC CIP Compliant

    Benefits of Being NERC CIP Compliant

    NERC is the North American Electric Reliability Corporation. Their job is to monitor and maintain the standards for the North American “Bulk power transmission.” Essentially, NERC watches over all large electrical power stations and the dispersion of large amounts of electrical power throughout the United States, Canada and Mexico.

    (more…)

  • NERC CIP Standards: What You Need To Know

    NERC CIP Standards: What You Need To Know

    Although usually taken for granted, Critical Infrastructure connects east to west, north to south, and ensures businesses and homes can operate on a daily basis. With the news reports of hurricanes, mudslides, and fires, it’s easy to think that natural disasters are the main threat against such infrastructure. However, cyber attacks increasingly threaten the functionality of Critical Infrastructure. Even in the cybersecurity world, the top priority tends to lean toward information security. To draw more attention to the vulnerabilities of Critical Infrastructure and to improve industry cyber security standards, the North American Electric Reliability Corporation (NERC) formulated a Critical Infrastructure Protection (CIP) plan. The NERC-CIP standards work to improve the security and infrastructure protection of North America’s power bulk system by protecting physical and cyber assets.

    (more…)

  • What Is Threat and Vulnerability Management For NERC CIP?

    What Is Threat and Vulnerability Management For NERC CIP?

    Security threats against utilities have been a constant focus for bulk power systems (BPS) for decades.  After a massive outage in August 14, 2003, 50 million people in the Northeastern United States (U.S.) and parts of Canada were left without power for most of the evening. The problem that federal authorities dealt with in the aftermath of the blackout was how to handle those responsible for the blackout.  Since there was an absence of federal regulations related to a blackout of this magnitude and no federally mandated processes that BPS operators needed to follow, it was impossible to fine those responsible.

    (more…)