by John Bruggeman | Sep 8, 2021 | Blog, Security
In my previous blog posts I’ve talked about the NIST CSF, and then I talked about another framework from the non-profit Center for Internet Security (CIS), which has a smaller set of controls to help companies and organizations secure their environment. I promised at...
by John Bruggeman | Aug 16, 2021 | Blog, Security
In my previous post on the question of being ransomware-proof, I talked about the NIST Cybersecurity Framework (CSF). Some of you, I am sure, Googled “NIST CSF” and found tons of information from NIST on the framework. Then as you looked at the details, you might have...
by John Bruggeman | Aug 11, 2021 | Blog, Security
The Transportation Security Administration (TSA) announcement in May regarding new requirements for owners and operators of gas pipeline operators is an indication that the federal government is not going to take a light approach regarding cybersecurity. Rather than...
by John Bruggeman | Jul 28, 2021 | Blog, Security
Wouldn’t it be great if you had your information security program at the point where you had confidence that if a criminal gang attacked you, you would be able to defend yourself, keep your business going, notify the appropriate legal authorities, and any vendor...
by John Bruggeman | Jul 8, 2021 | Blog, Security
Over the weekend another major crypto ransomware attack occurred, this time through an enterprise software vendor called Kaseya. For many CEOs or business owners, that name might not be familiar, since many of the companies that use this software are Managed Service...
by Justin Hall | Jun 8, 2021 | Blog, Security
Seems like nowadays, everybody’s got an opinion on how to protect your data and assets from threats like ransomware, supply chain attacks, and good old exploitation of vulnerable Internet-facing services. That’s not really a bad thing, to be honest. At the heart of...
Recent Comments