I’ve been known to use quotes to inspire or strengthen my message, so here goes: “The sky is falling, the sky is falling” (The Remarkable Story of Chicken Little, 1840). Believe it or not, this Chicken Little quote has significance to businesses: If you are not ready for incidents, individuals will go into a panic and act like the sky is falling. Preventing this is the main focus of an incident response plan (IRP), which takes control of events that could cause catastrophic harm to your organization in advance so that you do not panic when they actually occur.
Read MoreTopics: Security, Cyber Security, Cyber Awareness, Disaster Recovery, Cyber Recovery, Business Continuity
Disasters. They can mean different things to different companies. One company might be scrambling without any sense of direction during a malware attack; another company might be as cool as a cucumber. The difference is having a plan in place and the right personnel to help fulfill it. Franz Kafka, a major figure in 20th-century literature, stated, “Better to have and not need than to need and not have.”
Read MoreTopics: Security, Cyber Security, Cyber Awareness, Disaster Recovery, Cyber Recovery, Business Continuity
Oscar Wilde once stated, “To expect the unexpected shows a thoroughly modern intellect.” In continuing our look into being prepared during Cybersecurity Awareness Month, our second installment will focus on business continuity, what it entails, and the ongoing process to ensure it doesn’t become a "set it and forget it.”
Read MoreTopics: Security, Cyber Security, Cyber Awareness, Disaster Recovery, Cyber Recovery, Business Continuity
October is Cybersecurity Awareness Month, but it’s about more than just awareness. It’s important that your organization is prepared for the inevitability of facing cyberthreats.
Read MoreTopics: Security, Cyber Security, Cyber Awareness, Cyber Recovery
The Financial, Technical, and Security Benefits of Administration Automation
Posted on September 7, 2021 by David Lover
Today I want to talk about one of the guiding principles of modernization: Automation. When I talk about automation, I’m specifically talking about administration automation. At first, it would seem like this is mostly about making life easier for the administrators—and yes, that’s part of it. However, there’s actually a lot of business value that goes along with this type of automation. Let’s take a look at the benefits from the lens of the different stakeholders.
Read MoreTopics: Security, Unified Communications, Cyber Security, Automation
With public cloud adoption becoming the way of life for the increasing number of organizations looking to solve business challenges with remote working, questions about its security implications are inevitable. However, security has many different meanings and challenges in the public cloud with native solutions.
Read MoreTopics: Cloud, Security, Cyber Security, Cloud Infrastructure
There is an old saying that states, “Take care of your house and let others worry about theirs.” This might be valid in the pre-internet world, but with so many dependencies and relationships that have been created between partners and third-party suppliers, the “trust but verify” motto has become commonplace—or has it? Companies are only as strong as their weakest links. Creating a strong cybersecurity program internally is not enough, as the program should include all aspects of business in which data is vulnerable.
Read MoreTopics: Security, Cyber Security, Cyber Awareness, Ransomware
Since its launch in 2010, Microsoft Azure has gained popularity and trust with customers on a global scale. Azure is a public cloud offering that provides solutions for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). However, as with any cloud provider, there are concerns around security and breach issues (i.e., how safe is my data?), as the solutions are hosted in a cloud service provider (CSP) data center.
Read MoreTopics: Cloud, Security, Data Center, Microsoft, Cloud Infrastructure
Current Status of Hafnium
Coming on the heels of the still evolving SolarWinds data breach, it is now verified that four previously unknown or "zero-day" vulnerabilities in Microsoft Exchange Server are being used in widespread attacks against thousands of organizations, with many more potentially affected, according to security researchers.
Topics: Security, Cyber Security, Cyber Awareness
In part one and part two of this blog series, we shared fourteen cybersecurity tips to prepare your organization for 2021. This blog post includes seven final tips to keep your organization safe in 2021.
Read MoreTopics: Security, Cyber Security, Cyber Awareness, Ransomware