Managing Ransomware Incidents: A Comprehensive Legal Guide

Understanding Ransomware: A Threat to Home and Business Security Ransomware is a form of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. This cybersecurity threat has become a [...]

Managing Ransomware Incidents: A Comprehensive Legal Guide2024-08-14T11:54:07-07:00

Unmasking the True Motives Behind Ransomware: The Case of Bronze Starlight

Ransomware attacks have surged in recent years, causing significant financial and operational damage to organizations worldwide. However, not all ransomware campaigns are driven purely by financial gain. The case of the Chinese-based threat actor known as Bronze Starlight, [...]

Unmasking the True Motives Behind Ransomware: The Case of Bronze Starlight2024-08-14T11:38:49-07:00

How is the Landscape of Cybersecurity and Ransomware Threats Evolving?

Cybersecurity remains a paramount concern for individuals and organizations alike. Among the various threats, ransomware has emerged as one of the most significant challenges, causing widespread disruption and financial loss. It is important to get educated on the current trends [...]

How is the Landscape of Cybersecurity and Ransomware Threats Evolving?2024-08-14T11:38:00-07:00

How Can We Elevate Cybersecurity and Combat Ransomware Using Advanced Threat Detection Techniques?

As cyber threats evolve, so does the sophistication of ransomware attacks, posing severe challenges to organizations worldwide. The recent revelation by Securonix about the FROZEN#SHADOW campaign highlights the urgent need for advanced cybersecurity measures. Below, we will delve into the [...]

How Can We Elevate Cybersecurity and Combat Ransomware Using Advanced Threat Detection Techniques?2024-05-31T12:18:32-07:00

Steps for an Effective Cybersecurity Incident Response Plan

Written by Kevin McDonald, COO and CISO of Alvaka Networks. Originally published January 2016 on TechTarget. Kevin discusses steps to help you prepare a cybersecurity incident response. When your system is compromised, you generally have one chance to get the response [...]

Steps for an Effective Cybersecurity Incident Response Plan2021-06-23T12:37:20-07:00

What 12 Security Things Should I Focus on to Be Defensible in 2016?

Here is a sneak-peek and what is likely my most important blog for the upcoming New Year.  This is just a partial teaser....

----------------------------------------------------------------------

Irvine, CA - I was recently asked by a roundtable of CEOs to advise them on network security.  They had a lot of questions and a lot of misinformation.  I was surprised as this was a group of technology company CEOs and what I quickly found out is that they did not know much more than my non-tech company CEO clients.  From that discussion they asked me to come back and present to them a short list of actions they should take in 2016 to better secure their systems.  Initially I wanted to present them with a list of 10 things they should focus upon.  For anyone that knows, it is easy to create a list of 100 things that should be done to secure a system. However, I decided in order to make the list actionable and not overwhelming I needed to focus on the 10 things I have seen in the past year or two that have caused the most real-life grief for our new and existing clients.  I wanted to keep the list to 10 items, but I had to fudge a bit and expand to 12 core items. Then I added three bonus items for those who are over-achievers and another three for those in regulated businesses like healthcare, financial services and Sarbanes-Oxley.

This list is not complete nor absolute.  It is a list I have created largely in order of my perceived importance based upon the real-life hacks, breaches and other maladies related to failures of network security to keep the bad guys out.  You will need to assess the requirements that are appropriate for your firm.  If you are looking for a good place to start, I offer up my suggestions below.

1.       You need to do a vulnerability assessment or security assessment.  It is impossible for you to know what actions you should take to properly secure your systems without first doing an assessment.  Assessments are common practice at many firms, yet completely ignored at others.  It is fairly easy for you to order a vulnerability assessment and the best part is that it takes very little time and participation from you and your IT staff.  The cost for this service ranges from a few thousand dollars for a very small firm to several tens-of-thousands or even hundreds of thousands of dollars for larger enterprises.  These should be done at least once per year just like your financial audit.

2.       Patching for Software Security Updates is perhaps one of the most overlooked and under-rated security measures you can implement to better secure your systems.  I maintain that good software patching measures are in some ways more important than your firewall.  A firewall is a formidable device that once it gets set-up has a number of ports opened up so that your firm can transact business.  That is where it gets weak.  Through these legitimately opened ports attackers will send nasty payloads that compromise your system, often without you knowing.  Imagine a hardened castle all buttoned up, but the draw bridge must be opened in order to conduct commerce.  Through that legitimately opened bridge come the sneak attacks, the scammers, crooks, mischievous and spies....

What 12 Security Things Should I Focus on to Be Defensible in 2016?2015-11-12T03:10:52-08:00