Perfect Storm For Cybersecurity Risk

Greg Masters, Managing Editor of SC Media does a great job painting a clear picture of cybersecurity this year from the statistics recently published in ISACA’s “State of Cyber Security Study 2017”.  It is clearly a“Perfect storm: Not only is the volume and complexity of cyberattacks increasing, but there’s also a lack of resources necessary to[…]

Better Cybersecurity Starts With Mindset Change

Your Mindset is STILL the key element to better cybersecurity. Your understanding of the newest threats and defense technologies, and your willingness to make changes are what improve your cybersecurity. There will always be discussion and buzz on new tools and tactics, but the essential element is your cybersecurity mindset.   If you fail to grow[…]

Cyber-Security

Cyber Security – Information Security

Protect ourselves with cyber security is fundamental. In our organization, personal life, as well as in our schools. “Cyber security practitioners, perform job functions related to protecting and defending information systems. This is done by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.” CyberSec First Responders Certification Benjamin Franklin; “An ounce of prevention is worth a pound[…]

insurance-protection

Cybersecurity Insurance – Is it Lucrative?

Business Owner:  “What you think about cybersecurity insurance?” Me:  “Very lucrative business today.” Business Owner:  “No, I mean, do you think I need some?” Me:  “Oh!  What you’re really asking is, will it save your bacon if you get hacked.” Business Owner:  “er…um…Yeah! Me:  “Maybe.  The cost/value of cybersecurity and cybersecurity insurance both depend on[…]

cyber security stacks-of-money

Cybersecurity – The Real Cost

The burden of proof always falls upon the CIO, CISO, InfoSec Specialists, and IT Service Providers in justifying the costs for cybersecurity. Or maybe they delegate the cost justification further down the ladder to you. In any case, that cost calculation needs to be done with both current operational data, and current valuation of breach[…]

blacklisting castle-water-bridge

Critical Line of Defense

  Critical Line of Defense Understanding your layers of defense to protect against malware and breaches is mission critical for the entire organization today. Each layer has a function and purpose, and is meant to stop malware before it strikes. (To simplfy this discussion let’s leave out detection and remediation since that is really after a breach occurs,[…]