What is Business Resilience Planning? Crisis management and business continuity planning is something that your organization may have engaged with quarterly or even annually pre-pandemic, but it is likely to have become significantly more active since then. Before settling back into complacency, thinking that one “black swan” event is all your organization will ever endure- […]
Category: IT Security
What are Steps to Take for Employee Offboarding? Establishing and following an IT protocol for offboarding employees is a critical, but often overlooked, cybersecurity protection activity. More often than not, an organization cannot predict how/why/when an employee will exit the organization, so having a plan in place that can be applied in any kind of […]
What are IT Security Risks for National Critical Functions? Whether your organization is public or private, it exists within a complex system where it might a greater role and responsibility in national security than you may have realized. The Cybersecurity & Infrastructure Security Agency (CISA) defines National Critical Functions (NCFs) as, “…functions of the government […]
Secure Web Browsers
What are the Features of Secure Web Browsers? As is the case with many tools and utilities that we use in our daily lives, we often continue to use what is comfortable and familiar, without giving much thought to what other innovations may have arrived on the scene over the years. If this is the […]
How are Web Applications Securely Coded? As organizations become more mindful of the critical role of cybersecurity in their business, they are increasingly interested in web application development with security at the forefront. A savvy developer with a security mindset will engage in coding practices such as the following recommendations from the Open Web Application […]
What is IT Monitoring? IT monitoring is the process of gathering metrics about the operations of an IT environment’s hardware and software to ensure that the equipment is available and performing to the level expected and necessary to maintain your business. This is achieved by using trends to validate infrastructure updates before applications or services […]
What is Enterprise Network Security? Enterprise network security is the protection of a network that connects the systems, mainframes, and devices within an enterprise. Wireless networks (Wi-Fi) are vulnerable to cyberattacks as they lack many of the robust security tools that secure wired networks, such as firewalls, intrusion protection systems, content filters, and antivirus and […]
What are Security Misconfigurations? Security misconfigurations are a result of security settings not being defined or implemented, and default values are maintained. This typically means that configuration settings do not comply with industry security standards which are critical to maintaining security and reducing risk. Security misconfigurations happen most often when a system administrator or database […]
What are the Security Risks of Remote Productivity Apps? Due to the rise in remote working, more of us than ever are utilizing productivity application to facilitate meetings, to collaborate, and to share files and information. While productivity apps such as Slack and Teams have robust security features, there are still many potential vulnerabilities that […]
Security.txt
What is a Security.txt File? Organizations adopt a wide variety of disclosure policies and cybersecurity practices, but these are often a mystery to the security researchers tasked with informing an organization about security vulnerabilities or data leaks. A common scenario is a security researcher finding sensitive information from an organization for sale on the dark […]