Blog

Introduction to the CIS 20 Controls

Introduction to the CIS 20 Controls

The Center for Internet Security (CIS) Top 20 Critical Security Controls (previously known as the SANS Top 20 Critical Security Controls), is a prioritized set of best practices created to stop the most pervasive and dangerous threats of today. The controls were...

Joint Cybersecurity Advisory from CISA/FBI/HHS

Joint Cybersecurity Advisory from CISA/FBI/HHS

A joint Cybersecurity Advisory has been issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS). This advisory describes the tactics, techniques, and...

Are you prepared for law firm data breach litigation?

Are you prepared for law firm data breach litigation?

A $50 million dollar malpractice suit against a law firm for failure to protect a prominent client's data is being closely watched as it highlights the question "Is a data breach a breach of duty"? In at least two cases, courts have gone so far as to hold that...

SUBSCRIBE TO OUR Blog UPDATES

NIST CSF – Part 5 – Recover

NIST CSF – Part 5 – Recover

In this final post on the National Institute of Standards and Technology Cyber Security Framework (NIST CSF), we will look at the final section, "Recover". In our earlier blog posts, we learned how to identify our assets and then we did our best to protect them. Then...

How to show Return on Investment for cybersecurity

How to show Return on Investment for cybersecurity

When a new solution is being recommended to improve cybersecurity, it often will require buy-in from one or more people who may not have the technical knowledge to fully understand the benefits.  In those cases, making the business case for the solution can help with...

Productivity vs Security

Productivity vs Security

When we think about an organization that would put far more focus on day-to-day productivity than cybersecurity, we probably think of a small business that doesn't have much critical data, not the Central Intelligence Agency/CIA.  However, we can all learn from five...

Can Zero Trust Network Access make you more secure?

Can Zero Trust Network Access make you more secure?

Zero Trust Network Access or ZTNA is an approach to access that does not put the user’s computer directly on the network. Unlike traditional VPN where the entire workstation becomes part of the network, ZTNA only allows the user to access the applications and services...

Cybersecurity Maturity Model Certification (CMMC) FAQs

Cybersecurity Maturity Model Certification (CMMC) FAQs

We've had a resurgence in questions around the change from NIST 800-171 to the new Cybersecurity Maturity Model Certification (CMMC).  Here are some of the frequently asked questions and responses. What is CMMC, and why is it replacing NIST 800-171?  CMMC stands for...

US may address data security through new legislation

US may address data security through new legislation

The Digital Identity and Authentication Council of Canada (DIACC) uses the Pan-Canadian Trust Framework (PCTF) to establish guidelines for securing data and protecting the rights of Canadian citizens by controlling and notifying citizens of how the data is used. The...

Are you spending enough (or too much) on cybersecurity?

Are you spending enough (or too much) on cybersecurity?

What is the right amount to spend on cybersecurity?  Gartner reports average spend of 5-8%, but a CIO survey showed closer to 15% of the IT budget with almost a quarter of the respondents allocating more than 20% of their IT budget to securing their data. Now that...

Master Agents Fighting Cybercrime

Master Agents Fighting Cybercrime

As cybercrime continues to increase, master agents are expanding their services to help protect their customers from losses related to cyber incidents. Telarus recently added Foresite's cybersecurity testing, compliance assessments, audits and consulting, and SOCaaS...

10 things the C-Suite needs to understand about cybersecurity

10 things the C-Suite needs to understand about cybersecurity

Executive involvement is a critical component to any organization's cybersecurity. Why?  The IT department may not have all of the knowledge about what data could have a critical impact on the business if it was lost or exposed, IT can recommend security controls, but...

What basics do I need to know about quantum computing?

What basics do I need to know about quantum computing?

We keep hearing about quantum computing and how it is going to change cybersecurity as we know it, but what is it? Today’s computing is made up of binary bits either 0 or 1, therefore if we ask a computer to guess a number 0-9 it will try 0000, then 0001, 0010,0100,...

What is the government doing to protect us from cybercrime?

What is the government doing to protect us from cybercrime?

A question we have been hearing a lot lately is "what is the government doing to protect business from cyber threats", after all, cyber attacks are often coming from other countries and have been compared to another form of warfare or terrorism. Here in the U.S., the...

How has COVID changed cybersecurity?

How has COVID changed cybersecurity?

Priorities have shifted a bit as COVID drastically changed the way work is being done for so many organizations.  Now that it's become clear that it will not be as short-term a change as we first thought, how does this impact cybersecurity?  Based on our insights and...

Case study – The evolution of a solution

Case study – The evolution of a solution

The time had come for a contract renewal with one of our Managed Security Services clients, and we started the conversation with a look back at what we have accomplished together since 2015 when the relationship began. At that time, the main focus was on replacing...

5 Tips for Effective Log Analysis

5 Tips for Effective Log Analysis

The technologies that you have invested in can provide even more value if you are able to analyze the log data effectively.  Here are 5 key tips: Know which logs to monitor and which not to monitor.  With the average infrastructure generating millions of log events,...

What is Cyber Security as a Service (CSaaS)

What is Cyber Security as a Service (CSaaS)

When you think about information technology implementation and support, the optimal solution is often the combination of internal resource(s) who know the business, the culture and the current technologies and controls and an outside resource who specializes in the...

A Third Party Claims You Have Been Breached, What Do You Do?

A Third Party Claims You Have Been Breached, What Do You Do?

Organizations sometimes ignore breach notifications because of a loophole in virtually all privacy regulations – they do not address third-party notifications, so companies feel free to ignore them. Whether deliberate or a casualty of the notification overload...

Serverless Computing Security Considerations

Serverless Computing Security Considerations

One of the latest approaches to client server computing is going ‘serverless" - a move from ‘DevOps’ to ‘NoOps’. In serverless computing, the developers use code to simply create instances.  Serverless computing is a cloud computing execution model in which the cloud...

States look to Feds for cybersecurity funding

States look to Feds for cybersecurity funding

The recent pandemic has left state and local governments with budget shortfalls as cyber threats continue to rise, leaving state asking the federal government for funding to help them protect their data. A coalition of Governors, Comptrollers, CIOs and Emergency...

Cyber insurers increase scrutiny of policyholders

Cyber insurers increase scrutiny of policyholders

COVID-19 has changed our world in many ways, and the Wall Street Journal reports that due to the heightened security risk from the increased remote workforce, commercial insurers are taking a closer look at their policyholders and new applicants for cyber coverage....

Demystifying SOC Opinions and Exceptions

Demystifying SOC Opinions and Exceptions

The difference in how well a SOC 2 organization measures up is in the details. CPA firms who audit for SOC 2 compliance use exceptions and opinions, so it's important to understand how these apply. Exceptions Audit exceptions are simply deviations from the expected...

Is your SOC ready for the future?

Is your SOC ready for the future?

A reported by Ponemon on The Economics of Security Operations Centers: What Is the True Cost for Effective Results" included a number of key findings to consider if you are looking at setting up a SOC, reviewing the value of your current SOC or considering outsourcing...

What does this story about celebrity data mean for you?

What does this story about celebrity data mean for you?

A ransomware attack has hit a prominent NYC law firm with a client list that includes top celebrities, musicians, sports stars and media companies.  The attackers are demanding an undisclosed ransom or they will begin leaking data in a phased approach, putting the...

Should You Rely On Your Cyber Insurer for Incident Response?

Should You Rely On Your Cyber Insurer for Incident Response?

If your business suffered a fire, who would you want to call first, your commercial insurer to file a claim or the fire department to come put out the flames?  When a cyber incident occurs, the same thinking should apply, but it is being complicated by organizations...

What is MITRE ATT&CK?

What is MITRE ATT&CK?

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations of cyberattacks. They’re displayed in matrices that are arranged by attack stages, from initial system access to data theft or machine...

What grade would your school get in cybersecurity?

What grade would your school get in cybersecurity?

Cyberattacks that focus on schools are becoming more frequent. Why? Schools are considered an easy target as lack of funding for proactive cybersecurity means that the IT team is woefully outgunned and often already overwhelmed with providing the day-to-day support...

Classifying the severity of a cyber incident

Classifying the severity of a cyber incident

Ideally you would already have classified your data and be aligned with a cybersecurity or compliance framework to be able to effectively classify the severity level of various types of incidents.  This quick reference model can help with communication and next steps...

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?  It's a fair question. You may already be paying for IT staff and many tools exist to collect logs. There are important considerations when you make this decision. Let's start with your staff.  If they are like most IT...