Benefits of a virtual CISO over a full-time CISO

Benefits of a virtual CISO over hiring a full-time CISO It doesn't take much these days to realize cyber security is a big topic. We can hardly go a week without hearing about a cyberattack on the latest high-profile target. Facebook, Adobo, Panera and Sony are some recent companies that had some big, high-profile breaches. Companies with lots of users, servers or sensitive data need to evaluate their risk position when it comes to cybersecurity. This quickly becomes a conversation about whether to hire a Chief Information Security Officer, CISO. There are a lot of companies out there with [...]

Why a Managed SOC Saves Critical Time and Money

Companies of all sizes are catching on that they need to pay more attention to security. When they realize they need to invest, the concept of a Security Operation Center (SOC) will soon come up. Companies can put in their own SOCs or work with a third party with a Managed SOC. This article explains some benefits of a managed SOC. You Need to Separate your NOC from your SOC Many companies do not have an independent Security Operation Center (SOC). A common theme is they have the network engineers do additional task. Some companies can get away with [...]

What Happens During a Cybersecurity Assessment?

When most people think of cybersecurity, they think of anti-virus and firewalls. While that is part of cybersecurity, it is equivalent to thinking of a tire or a windshield when thinking about an automobile. Cybersecurity is the comprehensive ability of an organization to identify, protect, detect, respond and recover from cyberincidents. These cyberincidents have the potential to damage brand integrity through data loss or leakage. Cybersecurity assessments are an important compoent to any greater cybersecurity strategy. This article discusses what happens in a cybersecurity asessment. A Cybersecurity Posture Assessment is standardized process used to define, evaluate, assess and document [...]

Cybersecurity Best Practices

People often tend to think of cybersecurity as only an IT function, such as network security, or like a firewall or having antivirus on a computer.  Cybersecurity is driven at the organization level. It is composed of culture, behavior, goals, priorities and then protections, procedures and verification. Cybersecurity best practices are much more than at the IT level. Cybersecurity starts at the top with the executives and trickle down to management. Management needs to articulate plans to the technical architects, engineers, analysts and tools.  On the executive level, cybersecurity needs to be a business strategy. In the IT ranks, [...]

4 CyberSecurity Trends In 2018 [INFOGRAPHIC]

4 Cyber Security Trends In 2018 AI/Machine Learning - Double Edged Sword - It will soon be a weapon against attacks, malware, ransomware and viruses - Hackers will incorporate it Renewed Commitment To Zero-Trust Security - Insider threats need a new strategy - Right access for the right people IoT Vulnerabilities - 25B IoT devices = 25B security threats Continued Rise of Ransomware - Insurance policies - Better Malware https://decideconsulting.com/4-cyber-security-trends-2018-company-cant-afford-ignore/