Large Organizations are Small Too

Large public and private organizations are comprised of big, medium and small organizational components. Sharing a common understanding and unified messaging is critical to delivering business/mission value and security.  Small and mid-size businesses constitute the largest grouping of employers in national and global economies. Thinking of large organizations separately from small- and mid-size organizations ignores very important opportunities […]

Protect Devices

How to Protect Your Devices Whether employees or vendors use company-issued devices or their own when connecting remotely to your network, those devices should be secure. Follow these tips — and make sure your employees and vendors do as well: Click here for pdf

Cybersecurity Framework

What is the NIST Cybersecurity Framework? Does it apply to you? NIST is the National Institute of Standards and Technology at the U.S. Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The Framework is voluntary. It gives […]

Control Access to Data Sensibly

Federal Trade Commission Guidance Control Access to Media You’ve conducted an information “census” to identify and locate the confidential data in your company’s possession. Then you determined what you need to hold on to for business purposes. What’s the next step? According to Start with Security, it’s time to put limits in place to control access to […]

Reasonableness-FCC

Protecting the Privacy of Customers of Broadband and Other Telecommunications Services WC Docket No. 16-106 The following is taken from the FCC document titled above. Click on the title to see the entire document.  Sections 241-243 address reasonableness. By clarifying that our standard is one of “reasonableness” rather than strict liability, we address one of […]

Internet of Things FBI

CYBER ACTORS USE INTERNET OF THINGS DEVICES AS PROXIES FOR ANONYMITY AND PURSUIT OF MALICIOUS CYBER ACTIVITIES Cyber actors actively search for and compromise vulnerable Internet of Things (IoT) devices for use as proxies or intermediaries for Internet requests to route malicious traffic for cyber-attacks and computer network exploitation. IoT devices, sometimes referred to as […]

Internet of Things US Cert

Securing Security Tip (ST17-001) The Internet of Things refers to any object or device that sends and receives data automatically through the Internet. This rapidly expanding set of “things” includes tags (also known as labels or chips that automatically track objects), sensors, and devices that interact with people and share information machine to machine. Why […]