Incident Response Plan: The Tool You Hope You Never Need

Posted by Simone Erskine on May 15, 2019 12:55:00 PM

This is an original article written by Isaac Wright, a Cybersecurity Analyst and Trainer at Alpine Security.

It’s no question that in cybersecurity, defense is the best defense. In the constantly changing threat landscape, the tie often goes to the attacker, and businesses are forced to act like turtles putting up shells of security to ward off threats.  That is not always a bad thing; using a well-constructed defense- in- depth plan can greatly limit the likelihood of a successful attack.  I would like to believe we can get to a 99.99% level of security.  Even if that were true, that extra .01% keeps me up at night. What do we do if the controls fail? How do we respond then? What do we do the other 1% of the time? Once we find out that our emails have been hacked, or our money has been stolen is not the time to ask, “what now?” Even worse, what do you do when you suspect that an insider has embezzled funds and the evidence is located on their computer? Though we invest in and rely on our security controls, it is unfortunately not always enough.  We must have a plan for the .01%.

+

Cybersecurity: It's Only One Piece of the Business Security Puzzle

Posted by John Remsey on Feb 25, 2019 9:42:00 AM

Cybersecurity continues to be a hot topic for manufacturers – and rightfully so! According to the State of Industrial Cybersecurity 2018 by Kaspersky, “Over three quarters of the companies surveyed state that it is very likely or at least quite likely to become a target of a cybersecurity attack in the operational technology and industrial cybersecurity space. Despite this, only 23% are compliant with minimal mandatory industry or government guidance and regulations around cybersecurity of industrial control systems.”

+

5 Questions to Ask Your Cybersecurity Professional

Posted by Simone Erskine on Oct 18, 2018 12:41:37 PM

This is an original article by Kathleen Martin, MEP's IT Security Officer and a Certified Information System Security Professional.

Almost weekly we hear about another company or organization that has fallen victim to a cyber-attack. We know cybercriminals are more persistent and we need to be more diligent about protecting information.

+

Dealing with Cyber Attacks–Steps You Need to Know

Posted by Emily Lee on Aug 27, 2018 3:23:14 PM

This is an original article by Elliot Forsyth, Vice President of Business Operations at the Michigan Manufacturing Technology Center, part of the MEP National NetworkTM.

Any business owner knows that information is a vital part of running a company. As manufacturing increasingly becomes more digitized, cybersecurity must become a standard component of doing business. If sensitive information—such as employee records, customer transactions or proprietary data—is comprised, it can have a devastating effect.

That’s why more and more manufacturers are taking steps to protect their information via good information security practices.

+

Nobody Likes a Compliance Audit... and Why You Should Do Them Anyway!

Posted by Simone Erskine on Aug 7, 2018 2:33:46 PM

This is an original article written by Jana White, Cybersecurity Engineer and Trainer with Alpine Security.

What Is a Compliance Audit?

A compliance audit is an examination of documentation, records, or other evidentiary artifacts that use a specific set of regulatory controls to determine compliance. There are many different types of compliance audits including financial, technical, and cybersecurity audits. Common compliance audits include HIPAA, PCI-DSS, and SOC. 
+

Spot and Stop Phishing Emails

Posted by Simone Erskine on Jul 23, 2018 10:41:16 AM

 

Email is such a seamless part of everyday life that it is easy to take for granted just how vulnerable anyone can be to a well-crafted effort to steal your identity or confidential financial information. One of the most effective methods used by hackers is phishing, which entails trying to trick you into clicking on a link or attachment in an email. Instead of the attachment you thought you were opening, you have inadvertently opened the door to hacking from an outside source, usually without your knowledge.

+

5 Biggest Healthcare Cybersecurity Breaches

Posted by Simone Erskine on Jul 10, 2018 10:09:00 AM

 This is an original article written by Alpine Security.

The number of healthcare cybersecurity breaches is on the rise with tens of millions affected in larger breaches, but hackers may target even regional insurers, smaller healthcare facilities, pharmacies, and individual physician’s offices. These breaches put medical facilities, insurers, and practitioners in the hot seat because they are liable for the security of the information they gather. 

+

Two Keys to Stopping Cyber Attacks

Posted by IMEC on Jul 2, 2018 1:42:42 PM

This is an original article written by Alpine Security

Protecting your agency or company from cyber crime is critical to keeping your business running smoothly and profitably in the digital age.

What are two of the most likely areas of vulnerability in your cyber defense strategy?

+

Don’t Risk Losing your DoD Contracts!

Posted by Simone Erskine on Jun 5, 2018 11:30:32 AM

 

In a world where information security threats are constantly looming, it is important for companies – and required for manufacturers with Department of Defense contracts – to ensure they are protected and compliant. With the December 31, 2017 deadline for U.S Department of Defense’s cybersecurity compliance behind us, government contractors are required to demonstrate compliance in order to keep their contracts and gain new ones in 2018.

“Manufacturers have a variety of tools available to help pursue comprehensive organizational security, starting with cybersecurity. The first step is to determine one’s existing cybersecurity protections and tools and identify easy gaps to fill. Taking protective steps can decrease the time and resources spent on a security breach.”  - John Remsey, Senior Technical Specialist (IMEC)

+

Industrial Cybersecurity for Small- and Medium-Sized Businesses (Whitepaper)

Posted by Amy Fitzgerald on Apr 5, 2018 8:30:17 AM

Whitepaper and executive summary provided by the ISA, a technology and workforce training partner of IMEC.

Effective cybersecurity management is essential for all organizations, regardless of size. There are many standards and guidance documents available to help organizations determine a way forward.

The ISA whitepaper “Industrial Cybersecurity for Small- and Medium-Sized Businesses” is intended to provide a starting point for SMBs, particularly those that manage industrial processes and employ some level of automation. Specific examples include SMBs in the chemical, water, or wastewater treatment sectors.

While it is generally accepted that Operational Technology (OT) system security requires different or additional measures than general-purpose Information Technology (IT) system security, it is also true that smaller companies might have difficulty implementing much of the available guidance.

+

    Subscribe to Email Updates:

    Stay Connected:

    Posts by Category