Prevention STILL Beats Detection in Cybersecurity

The concept of Prevention before Detection is very easy to understand in most industries, except cybersecurity. Breach after breach in today’s news give us plenty of examples of cybersecurity professionals depending too much on Detection, and not enough on Prevention. But is that what you the business owner or consumer expect? I’m sure there are a[…]

DDoS Attacks – Making Sense Of It

Cybersecurity has certainly had an interesting few days with the massive DDoS attacks across the USA. The cause, the method, and the massive reach of this DDoS attack truly underscores another dimension of the importance of cybersecurity: making sure your network is not participating in an attack like this. Breaking down the DDoS attack to[…]

Malware Prevention vs Antivirus

Malware Prevention vs Antivirus

Understanding malware prevention, what you have and what is available to protect your computer network and data is essential. Otherwise you will be spending a lot of money on antivirus products that don’t do what you expected. Could also very likely spend a lot more money recovering from a breach (i.e. fines, lost time, lost[…]

Cyber-Security

Cyber Security – Information Security

Protect ourselves with cyber security is fundamental. In our organization, personal life, as well as in our schools. “Cyber security practitioners, perform job functions related to protecting and defending information systems. This is done by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.” CyberSec First Responders Certification Benjamin Franklin; “An ounce of prevention is worth a pound[…]

Application control, ransomware, computer security

Application Control – Prevent Ransomware

Begin protecting your computer today by using advanced application control. Given the volume of unknown malware, new variants, zero-day exploits, and hackers that are stealing and/or posting your data online, what good is any software that cannot stop the hack?  The second your data is stolen, you’re done!  There is no remediation.  Except to pay fines and eat the[…]

rave-party

Computer Antivirus – Rave On or Lockdown

How awesome is computer technology today! You almost forget what life was like before computers, right? Everyone has joined the party. It has grown so far and so fast that we now have blended our personal lifestyle into our business environment, via the computer. While technology has certainly provided many benefits, we must now deal with[…]

insurance-protection

Cybersecurity Insurance – Is it Lucrative?

Business Owner:  “What you think about cybersecurity insurance?” Me:  “Very lucrative business today.” Business Owner:  “No, I mean, do you think I need some?” Me:  “Oh!  What you’re really asking is, will it save your bacon if you get hacked.” Business Owner:  “er…um…Yeah! Me:  “Maybe.  The cost/value of cybersecurity and cybersecurity insurance both depend on[…]

cyber security stacks-of-money

Cybersecurity – The Real Cost

The burden of proof always falls upon the CIO, CISO, InfoSec Specialists, and IT Service Providers in justifying the costs for cybersecurity. Or maybe they delegate the cost justification further down the ladder to you. In any case, that cost calculation needs to be done with both current operational data, and current valuation of breach[…]

blacklisting castle-water-bridge

Critical Line of Defense

  Critical Line of Defense Understanding your layers of defense to protect against malware and breaches is mission critical for the entire organization today. Each layer has a function and purpose, and is meant to stop malware before it strikes. (To simplfy this discussion let’s leave out detection and remediation since that is really after a breach occurs,[…]