Start Your Cybersecurity Plan

There are a number of great frameworks for developing your cybersecurity plan.  Two of our favorites are the NIST-CSF and the 20 CIS Controls.  We have written about these excellent tools before here (CIS Controls) and here (NIST-CSF).

Back in December we received an email from Pete Herzog of ISECOM about a new, open-source methodology manual for cybersecurity defense. ...

Continue Reading →
0

CIS Controls Can Help You Stop Cyber Attacks

cislogowebOn of the more hopeful presentations from the Cyber Security Summit was presented by Tony Sager from the Center for Internet Security.  Titled “Making Best Practices Common Practices: The CIS Controls,” Tony provided us with a road map for implementing secure practices in our networks.

There are 20 CIS controls.  Tony said that implementing the first 5 (20%) would reduce your risk by 80%.  You ...

Continue Reading →
0

More Notes from the Cyber Security Summit 2016

cyber-security-summit-2016On Wednesday we looked at several of the important takeaways from this year’s Cyber Security Summit.  Here are a few more.

  • Small businesses need to stop using public email services such as Gmail, Yahoo, or Hotmail for their business email.  User credentials for 500,000 Yahoo email accounts have been stolen, and it could happen to the others.  If you have a domain name you are using for a web site, then you should ...
Continue Reading →
0

Notes from the Cyber Security Summit 2016

cyber-security-summit-2016A couple of weeks ago I attended the Minneapolis Cyber Security Summit 2016 at the J.W. Marriot Hotel in Bloomington Minnesota.  There were two days of presentations on cybersecurity issues, and here are a few of the takeaways for small and medium sized business owners.

  • There are 28 million small businesses in the United States.  The Small Business Administration classifies a business with fewer than 500 employees as a small business.
  • Small businesses account ...
Continue Reading →
0

NIST Offers Cybersecurity Assessment Tool

NISTNIST has created a self assessment tool for companies and organization who are working through the NIST Cyber Security Framework (NIST-CSF).  This tool is called the Baldridge Cybersecurity Excellence Bulder and is designed to help companies implement the principles of the CSF.

According to NIST, organizations can use the Baldrige Cybersecurity Excellence Builder to:

  • Identify cybersecurity-related activities that are critical to business strategy ...
Continue Reading →
0

What Should You Do If Your Info Is Breached?

US-CERTUS-CERT sent out an announcement in September about a new video from the FTC for people whose personal information may have been breached in a cyber incident.  There are tips on reporting, and how to recover with tools such as a credit freeze or fraud alert.  There are many links on both the CERT and the FTC websites to resources. ...

Continue Reading →
0

October is Cybersecurity Awareness Month

DHSFrom the Department of Homeland Security website:  “October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and ...

Continue Reading →
0

Detect and Defend Against Ransomware

maktub-lockerEncryption ransomware can be a devastating event if it happens to your or your company.  The three solutions are basically pay the money, restore from backup, or accept your losses and move on.  All are expensive, and some can be severe enough to drive a business out-of-business.Monday we gave you several ways to prevent, or at least prepare a response to a crypto-ransomware exploit.  Today we are going to look at early ...

Continue Reading →
0

Smartphone and Tablet Security Solutions

smartphone-securityOn Wednesday we discussed the many, many ways your smartphone is vulnerable to attack.  Today we will look at solutions.  Smart mobile devices need to be secured just as you would a laptop or desktop computer  The small size and easy portability of smartphones and tablets make them easier to steal or lose.  Some of our recommendations:

  • Record the electronic serial number (ESN) of your phone or tablet. This is information you will ...
Continue Reading →
0
Page 1 of 2 12