Cybersecurity Foundations – Business Continuity

Business Continuity

Foundations – Business Continuity OR Who You Callin’ A Psycho? What happens if? Asking this question helps us keep a business (or household) going in the event of an “incident.” What is an incident? Oh, it could be anything that is outside the normal, day-to-day operations that disrupt life as we know it. Doesn’t need […]

Cybersecurity Foundations – Access Control

Access Denied

Cybersecurity Foundations – Access Control OR Knock, Knock. Who’s There? Access Control is more than permissions. Once you have completed a Risk Assessment and understand your Intellectual Property and its value, you must protect it. Like everything in business, proper Access Control begins with a written policy that explains who, what, when, where, how, and […]

Cybersecurity Foundations – Acceptable Use Policy

Cyber Policy

Cybersecurity Foundations – Acceptable Use Policy OR You Didn’t Say I Couldn’t Do It Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra of different technologies, departments, budgets, people, and policies. To someone unfamiliar, it can be similar to standing at the base of Mount Everest with a secure environment at […]

Cybersecurity Foundations – Risk Assessment and BIA

Cyber Risk

Cybersecurity Foundations – Risk Assessment and BIA OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is often the hardest meeting to schedule with all relevant parties, the Risk Assessment (RA). The RA is part of a Business Impact Analysis (BIA) that directly feeds policy creation but […]

Cybersecurity Foundations – Frameworks and Policy

Cyber structure

Cybersecurity Foundations – Frameworks and Policy OR Did You Read the Instructions? Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra of different technologies, departments, budgets, people, and policies. To someone unfamiliar, it can be similar to standing at the base of Mount Everest with a secure environment at the summit. How can […]