BLOG
Cybersecurity Risk Assessment Funnel – Part #2: People
In the previous article how to ‘Build a Cybersecurity Risk Assessment Funnel,’ we addressed the challenges facing IT directors and security leaders trying to reduce risk by applying a repeatable methodology to identify and report on the risk of company assets,...
Build a Cybersecurity Risk Assessment Process Funnel
If you’re the director of IT for your company, you know without a doubt that there are too many systems, applications, and assets to perform risk assessments on. You’re trying to improve your cybersecurity program and reduce risk by implementing a cybersecurity risk...
How to Respond to Cybersecurity Questionnaires
Have you ever been in this situation? You’re looking forward to that new partnership, or bringing on that new client, and then you receive a cybersecurity questionnaire. The shock initially confuses you because you thought you were further along in the process than...
How To Encrypt an External Hard Drive
HOW TO ENCRYPT EXTERNAL HARD DRIVE? A hard disk drive is also known as a hard disk, hard drive, or fixed disk. It is an electromechanical data storage device. It uses one or more rigid fast rotating platters, which are coated with magnetic material to store and...
What Are the Types of Cybersecurity?
What are the Types of Cyber Security? What would your life look like without your electronics? Could you cope? Probably not. Our mobile devices, computers, and other devices are nearly inseparable from us. Individuals and businesses alike rely on electronics to...
Best Way to Keep Passwords Organized
Passwords keep our valuable data secure—but in the wrong hands, they can spell disaster! In a world where nearly everything happens online, passwords are the last line of defense. Think banks accounts, social media accounts, sensitive company data, or delicate...
Asset Management Policy (free downloadable policies)
To skip the article and download the policies and procedures provided: Asset Inventory - Policy and Procedures Sample-Asset Management Policy Introduction In our last several articles we’ve discussed and dived deep into the topic of asset management. Asset management,...
Cybersecurity: Improve the Identify Pillar of Your Program
Traction requires clarity. The overwhelming weight of attempting to improve the whole cybersecurity program often results in a lot of action and business without progress. One of the greatest ways to get traction on security program improvement is by aligning with an...
Scope & Define Identify Controls of NIST Cybersecurity Framework
When attempting to align your cybersecurity program with the NIST CSF framework it’s easy to get hung up and frustrated trying to figure out what the definitions mean, and how they apply to your cybersecurity program. When you read the NIST CSF categories and...
How to Improve Asset Management for Cybersecurity
Asset management is a pain. It’s like the gatekeeper to all the great cybersecurity controls. It’s like the cold vegetables on your plate you know you should eat before diving into that hot juicy piece of Midwest steak… And most of the time, as security professionals,...