Best Practices in Technology

A blog for understanding best practices in technology

Entries related to: cybersecurity

Work from Home Securely During the Coronavirus Outbreak

It seems like the world spun around and turned upside down in the blink of an eye. While some businesses are going to struggle in the coming months, others will pivot and find creative ways to get work done successfully and maintain cybersecurity best practices.
Read More

Revision 2 of NIST SP 800-171 is Released

As of December 31, 2017, companies that provide parts and services for suppliers serving federal and local governments must comply with the NIST 800-171 mandate. There have been some recent changes in how compliance is managed for this mandate.
Read More

CMMC Version 1.0 is Released

To increase the cybersecurity posture of companies operating in government supply chains, the Department of Defense announced the creation of the Cybersecurity Maturity Model Certification (CMMC) in 2019, and a draft was made available. On January 30, 2020, the DoD released Version 1.0 to the public.
Read More

Using a SIEM to Detect BEC & Other Cyber Attacks

Business email compromise (BEC), or imposter email, continues to plague businesses. In these scenarios, criminals gain access to an email account. Then, using the compromised account, they attempt to trick someone into sending money or sensitive information.
Read More

Cybersecurity Maturity Model Certification & NIST Compliance

As of December 31, 2017, companies that provide parts and services for suppliers serving the government were required to be compliant with the NIST 800-171 mandate. Starting in 2020, a new certification will be required: Cybersecurity Maturity Model Certification.
Read More

How to Improve Your Firewall Security with a Vulnerability Assessment

Your network firewall serves as the first line of defense between your network and the untrusted Internet. The configuration of the firewall is equally as important as the firewall itself. And since networks evolve over time, you need to check the configuration on a regular basis and make changes as warranted.
Read More

What is a managed firewall?

In the context of Defense in Depth, a firewall is the first step to creating a secure IT environment. A firewall is used to block traffic coming into your IT network as well as traffic going out. Within the simple security model of PROTECT - DETECT - RESPOND, a firewall protects. A firewall's primary function is to provide protection at the perimeter of your network.
Read More

SIEM vs. Firewall: Why do I need a SIEM if I already have a firewall?

If you are looking for ways to improve your company’s cybersecurity, you have probably considered security information and event management (SIEM) solutions. But you may be feeling overwhelmed by the costs involved and the time commitment in implementation. After all, if you already have a firewall and several other security tools in place within your IT infrastructure, why do you need a SIEM?
Read More

How much do managed IT services cost?

Service plans for your information technology can be as unique as your business. But it can be helpful to understand the factors that impact how much you will pay for IT managed services and what is usually included in common service offerings.
Read More

How can an IT network assessment benefit my business?

We have long recommended an IT network assessment as part of onboarding with new managed IT services clients. This provides a starting baseline of the current network infrastructure. From this, we can develop a strategy that will safeguard the systems used to run the business and ensure that the network supports the goals of the business.
Read More

Subscribe to Email Updates