by John Bruggeman | Oct 21, 2022 | Security
How concepts from the CIA Triad affect personal information Information security and information privacy defined While it may be easy to conflate the two, information privacy is not the same as information security. For information security professionals, the...
by Justin Hall | May 31, 2022 | Security
Happy summer, everyone! To celebrate, there’s a new Microsoft Windows zero-day vulnerability, currently classified by NVD as CVE-2022-30190, and nicknamed by the community as Follina. It exploits a flaw in the Microsoft Support Diagnostic Tool (MSDT) that uses the...
by John Bruggeman | Feb 2, 2022 | Security
Your brain is constantly working to detect threats to your safety–whether you realize it or not. When visiting an unfamiliar place, your senses take in stimuli, which your brain uses to protect you. For enterprises, defensive cybersecurity systems have the same goal....
by John Bruggeman | Dec 17, 2021 | Security
So far in this cybersecurity framework series, we’ve covered NIST CSF and ITSG-33 frameworks and CIS Controls as options for organizations to secure their IT environment. In this blog, we’ll peek behind the enemy lines of cyber crime by exploring the MITRE ATT&CK...
by John Bruggeman | Dec 15, 2021 | Security
Our previous blog post explored how security frameworks like ITSG-33 and the NIST Cybersecurity Framework (CSF) can help make your enterprise ransomware resistant. While there is a lot of information out there about these frameworks, the complicated steps recommended...
by John Bruggeman | Nov 9, 2021 | Security
In July another major crypto ransomware attack occurred, this time through an enterprise software vendor called Kaseya. For many CEOs or business owners, that name might not be familiar, since many of the companies that use this software are Managed Service Providers...