6 09, 2014

Cybersecurity Initiative: “Recover”

By |2018-09-06T08:39:40+00:00September 6th, 2014|Policy|0 Comments

Following an incident, organizations should analyze the results and discuss how it was handled, what could be done differently and how to implement planned improvements. Security takes re-evaluation on a regular basis and must include running mock disasters to understand how your team handles various scenarios and identify areas for improvement.

6 09, 2014

Cybersecurity Initiative: “Respond”

By |2018-09-06T08:38:41+00:00September 6th, 2014|Policy|0 Comments

Attempting to make key decisions or develop policies while you are in the middle of a cyber-attack is a recipe for disaster. Planning ahead and having an incident response plan (IRP) in place is key to properly handling and responding to an attack. An IRP should be written and updated with appropriate leadership and decision makers at [...]

6 09, 2014

Cybersecurity Initiative: “Detect”

By |2018-09-06T08:37:29+00:00September 6th, 2014|Policy|0 Comments

There is no foolproof, guaranteed security solution. Thus, detecting when a system's compromised is critical for both large and small organizations. Timely notification and detection of a comprised system or device is key, and one of many ways this can be accomplished is through intrusion detection systems (IDS), Artificial Intelligence (AI), advanced Machine Learning tools, Threat [...]

6 09, 2014

Cybersecurity Initiative: “Prevent”

By |2018-09-06T08:34:23+00:00September 6th, 2014|Cybersecurity Month|0 Comments

We live in a day and age where cybersecurity threats and vulnerabilities abound. Organizations must work smarter, not harder, to prepare for andprevent cyber-attacks. Preventing an incident requires developing strong security capabilities with careful planning, analysis, and testing. During the prevention planning stage, it’s critical that businesses and individuals work together to protect their organization's assets by applying security policies including [...]