IT Asset Management – Governance Policies & Procedures
by Kyle Daun on February 28, 2020 at 1:00 PM
One of the most daunting and time-consuming tasks that an IT administrator can face is logging, monitoring, and tracking assets for their organization. Depending on the size of an organization, tracking can vary and may or may not include a robust program with various tools and spread …
Guide to Improving Your Security Awareness Training
by Kyle Daun on November 20, 2019 at 1:00 PM
For the past 3 years that I’ve worked at Compass IT Compliance, I’ve had the opportunity to travel the country and meet with various clients ranging from small businesses with less than 10 people to organizations with offices around the world. The main constant that I have noticed wit …
The NIST Cybersecurity Framework – The Recover Function
by Kyle Daun on July 19, 2018 at 10:30 AM
You made it! The hard work and determination to protect your organizational assets has paid off. You were able Respond to the cybersecurity event and mitigate the long-lasting damages that the cybercriminals tried to employ on you. Now that the event is contained and eradicated, recov …
The NIST Cybersecurity Framework Functions – Respond
by Kyle Daun on June 8, 2018 at 10:00 AM
This is part 4 of our ongoing blog series on the NIST Cybersecurity Framework. To view our previous posts in this series, please see the links below: NIST Cybersecurity Framework - Overview and Identify NIST Cybersecurity Framework - Protect NIST Cybersecurity Framework - Detect After …
The NIST Cybersecurity Framework Functions - Detect
by Kyle Daun on May 16, 2018 at 10:00 AM
The third function that will be discussed is Detect. After we have identified the assets within our organization and have implemented ways on how to protect those assets, we need to implement measure on how to Detect cybersecurity incidents that may occur. This can be achieved with us …
The NIST Cybersecurity Framework Functions - Protect
by Kyle Daun on April 30, 2018 at 1:34 PM
As promised in last month’s blog about the NIST Cybersecurity Framework Identify function, this month we are discussing the Protect function. After an organization has addressed the five categories within the Identify function (Asset Management (ID.AM), Business Environment (ID.BE), G …