C-Suite and Techies: 6 Concepts for Understanding Source of Threats

When designing security it is important to understand what you are attempting to protect as well as what you are protecting against. What you are protecting are your assets and business processes. An asset is anything used in a business task. Without assets your organization could not function and would not exist. Your business processes are the activities performed to accomplish your mission or goals as well as providing products or services to your customers. What you are protecting against are the threats that could harm your assets or interrupt your business tasks.

Read more

Network Perimeter: Who Goes There?

Remember as a kid (or perhaps now as a parent) your mom would tell you, “When you go to Johnny’s house to play, go straight to his home, don’t stop anywhere in between, don’t take short cuts, and call me when you get there”? Your mom was managing what path to travel and other details to ensure safe arrival.

Read more

How To Build Your Own Cybersecurity Team

The U.S. Department of Labor expects employment of “Information Security Analysts” to grow by 37 percent from 2012 to 2022, or more than twice the rate of all “computer occupations,” which are themselves expected to grow 60 percent more than “all occupations.” In other words, if you are an information security analyst or studying to be one, then you are looking at rapidly growing demand for your services. Your future is likely to be very bright.

Read more

C-Suite and Techies: Minimizing End User Errors

Security is an essential business responsibility. For the typical organization, at least half of the violations of the security policy are from internal personnel. While most of those violations are mistakes or errors caused by ignorance, some are performed intentionally and maliciously, against the company, other employees — or even customers. For a top executive, reducing these violations is crucial to maintaining a growing business. For an IT manager and/or security manager, reducing these violations is important to prevent downtime and improve efficiency. Fortunately, there are many steps that can be taken to help reduce end-user security violations. Most of these solutions are a combination of technology and training. And they are designed to address specific situations. These ideas might not address every issue occurring in your organization, but you are likely dealing with a majority of these concerns.

Read more

Securing Cloud Data

Information security in any public cloud can meet contractual commitments and still allow your data to escape into the wild. This discontinuity is the subject of articles across the web, including documented cases of secure infrastructure plus lax polices equaling a data breach. Cloud providers for storage, services, application, infrastructure, etc. provide services and pricing that many executives and end users find enticing. The per-click, per-gig or per-transaction-only fees get our attention. The built-in redundancy, access from anywhere and ownership-eliminating possibilities cause us to think, how can this be a bad thing? Finally, the rigorous security compliance standards that some cloud service providers meet allows us to think, this will be OK. And it can all go very bad with one click.

Read more