Corporate IT environments are experiencing a state of change. Technology in the workplace is transitioning. In fact, what we define as the 'workplace' is changing. Microsoft Office 365 eases this transition.
Do you worry about security breaches? It seems you can't go more than a week without hearing of a major retailer or large financial institution dealing with a significant cyber attack. If companies with the biggest IT budgets are not immune, what can smaller companies do? Lots.
With ransomware events and security breaches in the headlines every day, business leaders have come to closely associate technology needs with cybersecurity. Maintaining a secure IT infrastructure for your company has become ever more difficult while at the same time critical to company profits. Creating a secure IT environment goes far beyond firewalls and anti-virus software.
You have signed the contract, installed the cabling, and configured your network devices. Syslogs are streaming into your new SIEM and alerting is operational. Finally, you can stop reviewing thousands of logs each day and move on to something a bit more interesting. (mic drop)
If you haven't suffered a security breach or ransomware attack recently, you may believe that your IT environment is secure, and you are successfully preventing intruders from getting in. But how do you know? Just because no one is reporting problems does not mean that malicious activity does not already exist in your environment.
These days it seems you can’t go more than a week without hearing of a major retailer or large financial institution dealing with a significant security breach. If companies with the biggest budgets are not immune, what can smaller companies do?
A quick triage of your emails tells you that today is not going to be a good day. There has been a data leak. Your company has lost control of its PII, PHI, CUI – take your pick. Data is up for sale on the internet and you need to figure out why.
Companies across all industries have taken steps to protect their data and prevent cybercrime. The use of information security frameworks grew out of a need for organizations to follow a set of steps to protect information. By selecting a cybersecurity framework, companies could adopt a set of policies and procedures around the implementation and ongoing management of information security controls in an enterprise environment.
As an IT manager, you may think of risk management as outside your purview. That's a mistake. Risk management should not be confined to the finance or accounting department at your company. Nor is it only for companies with their own risk management team led by a Chief Risk Officer to worry about.