5 Questions to Ask Your Cybersecurity Professional

Posted by Simone Erskine on Oct 18, 2018 12:41:37 PM

This is an original article by Kathleen Martin, MEP's IT Security Officer and a Certified Information System Security Professional.

Almost weekly we hear about another company or organization that has fallen victim to a cyber-attack. We know cybercriminals are more persistent and we need to be more diligent about protecting information.

+

Dealing with Cyber Attacks–Steps You Need to Know

Posted by Emily Lee on Aug 27, 2018 3:23:14 PM

This is an original article by Elliot Forsyth, Vice President of Business Operations at the Michigan Manufacturing Technology Center, part of the MEP National NetworkTM.

Any business owner knows that information is a vital part of running a company. As manufacturing increasingly becomes more digitized, cybersecurity must become a standard component of doing business. If sensitive information—such as employee records, customer transactions or proprietary data—is comprised, it can have a devastating effect.

That’s why more and more manufacturers are taking steps to protect their information via good information security practices.

+

Nobody Likes a Compliance Audit... and Why You Should Do Them Anyway!

Posted by Simone Erskine on Aug 7, 2018 2:33:46 PM

This is an original article written by Jana White, Cybersecurity Engineer and Trainer with Alpine Security.

What Is a Compliance Audit?

A compliance audit is an examination of documentation, records, or other evidentiary artifacts that use a specific set of regulatory controls to determine compliance. There are many different types of compliance audits including financial, technical, and cybersecurity audits. Common compliance audits include HIPAA, PCI-DSS, and SOC. 
+

Spot and Stop Phishing Emails

Posted by Simone Erskine on Jul 23, 2018 10:41:16 AM

 

Email is such a seamless part of everyday life that it is easy to take for granted just how vulnerable anyone can be to a well-crafted effort to steal your identity or confidential financial information. One of the most effective methods used by hackers is phishing, which entails trying to trick you into clicking on a link or attachment in an email. Instead of the attachment you thought you were opening, you have inadvertently opened the door to hacking from an outside source, usually without your knowledge.

+

5 Biggest Healthcare Cybersecurity Breaches

Posted by Simone Erskine on Jul 10, 2018 10:09:00 AM

 This is an original article written by Alpine Security.

The number of healthcare cybersecurity breaches is on the rise with tens of millions affected in larger breaches, but hackers may target even regional insurers, smaller healthcare facilities, pharmacies, and individual physician’s offices. These breaches put medical facilities, insurers, and practitioners in the hot seat because they are liable for the security of the information they gather. 

+

Two Keys to Stopping Cyber Attacks

Posted by Simone Erskine on Jul 2, 2018 1:42:42 PM

This is an original article written by Alpine Security


Protecting your agency or company from cyber crime is critical to keeping your business running smoothly and profitably in the digital age.

What are two of the most likely areas of vulnerability in your cyber defense strategy?

+

Don’t Risk Losing your DoD Contracts!

Posted by Simone Erskine on Jun 5, 2018 11:30:32 AM

 

In a world where information security threats are constantly looming, it is important for companies – and required for manufacturers with Department of Defense contracts – to ensure they are protected and compliant. With the December 31, 2017 deadline for U.S Department of Defense’s cybersecurity compliance behind us, government contractors are required to demonstrate compliance in order to keep their contracts and gain new ones in 2018.

“Manufacturers have a variety of tools available to help pursue comprehensive organizational security, starting with cybersecurity. The first step is to determine one’s existing cybersecurity protections and tools and identify easy gaps to fill. Taking protective steps can decrease the time and resources spent on a security breach.”  - John Remsey, Senior Technical Specialist (IMEC)

+

Industrial Cybersecurity for Small- and Medium-Sized Businesses (Whitepaper)

Posted by Amy Fitzgerald on Apr 5, 2018 8:30:17 AM

Whitepaper and executive summary provided by the ISA, a technology and workforce training partner of IMEC.

Effective cybersecurity management is essential for all organizations, regardless of size. There are many standards and guidance documents available to help organizations determine a way forward.

The ISA whitepaper “Industrial Cybersecurity for Small- and Medium-Sized Businesses” is intended to provide a starting point for SMBs, particularly those that manage industrial processes and employ some level of automation. Specific examples include SMBs in the chemical, water, or wastewater treatment sectors.

While it is generally accepted that Operational Technology (OT) system security requires different or additional measures than general-purpose Information Technology (IT) system security, it is also true that smaller companies might have difficulty implementing much of the available guidance.

+

Where Are Cybersecurity Threats Coming From?

Posted by Cytellix on Feb 20, 2018 9:07:00 AM

Written by Cytellix - an IMEC cybersecurity partner

There has been a lot of recent news and discussion about several malware variants that have been defined as ransomware attacks. There are and have been other damaging malware attacks, but ransomware popularity is currently very well publicized.

Ransomware attacks are not simple but are commonplace in the market today. These attacks typically find their way into an organization through social engineering. To be more specific, the malware is embedded in an attachment as an executable. There are several outcomes from ransomware that we have seen thus far: an individual machine is encrypted and the decryption key is held for ransom by the attacker and a currency request of a “Bitcoin” is requested to decrypt the machine in question. The nastier variants can traverse from machine to machine through the network, creating a systemwide infection. This attack causes severe networkwide shutdowns, causing an organization to recover through more significant ransom payments, or if the company was prepared, backup remediation steps are taken.

+

Cybersecurity – It’s Just One Piece of a Comprehensive Information Security Program

Posted by John Remsey on Sep 26, 2017 9:13:39 AM

Written by John Remsey, IMEC Senior Technical Specialist

Cybersecurity has become a hot topic within manufacturing over the past months, especially for the Defense supply chain with the federal government increasing their emphasis on addressing threats to the security of information.  In December 2015, the U.S. Department of Defense (DOD) released a rule to the Defense Acquisition Federal Regulation Supplement (DAFRS) that requires government contractors to implement the requirements of National Institutes of Standards and Technology (NIST) Special Publication (SP) 800-171 by December 31, 2017.  With this deadline fast approaching, conversation, and urgency, to become compliant is increasing.

+

    Subscribe to Email Updates:

    Stay Connected:

    Posts by Category