How Information Security Approach Affects Organizational Culture
by Andrew Paull on July 17, 2019 at 1:00 PM
In this technological era where big data drives innovation and companies are expanding the boundaries of their offerings, workforce, and geographic locations through automation, it’s easy to lose sight of some of the more human aspects of organizational operations.
Cybersecurity - Back to Basics
by Derek Boczenowski on June 14, 2019 at 1:00 PM
Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.
CIS Critical Security Controls V7.1 - What's New?
by Patrick Hughes on May 29, 2019 at 1:25 PM
The Center for Internet Security (CIS) is a non-profit information technology entity with a mission to safeguard organizations from cyber threats. CIS has created what’s known as the CIS Top 20 Controls. These are the global standard best practices for securing information technology …
Emotet Malware Warning From MS-ISAC
by Austin Wolfson on January 23, 2019 at 2:14 PM
In this blog we’ll be discussing the Emotet malware program, particularly regarding the most recent and ongoing malspam campaign using the Multi-State Information Sharing and Analysis Center (MS-ISAC), and State, Local, Tribal, and Territorial (SLTT) branding.
The NIST Cybersecurity Framework – The Recover Function
by Kyle Daun on July 19, 2018 at 10:30 AM
You made it! The hard work and determination to protect your organizational assets has paid off. You were able Respond to the cybersecurity event and mitigate the long-lasting damages that the cybercriminals tried to employ on you. Now that the event is contained and eradicated, recov …
WannaCry Lives On! Have we Learned Anything?
by Adam Cravedi on May 21, 2018 at 10:58 AM
As the one-year anniversary of the most widely spread ransomware attack approaches, WannaCry is still active in the wild. Fortunately, so is the “kill switch” domain, rendering the attack mostly benign. During the WannaCry outbreak MalwareTech, a UK-based researcher, discovered that W …