Classification of Information Assets

If we would like to establish effective security controls to protect our information assets, we should first start by classifying those assets.  Like the controls in place to protect the information, the respective classification follows a process where we evaluate the degree of necessary confidentiality, integrity, and availability of the Read more…

Vulnerability Scanning

What is vulnerability scanning? Vulnerability scanning is the process of examining external and internal attack surfaces to identify weaknesses that will be exploited by malicious actors who attempt to infiltrate an organization’s systems, data, network, infrastructure, web page, or application. What is meant by “weaknesses”? Given the complexities of information Read more…

Human Resources and Information Security

The HR team may not be the first group that comes to mind when the Information Security topic surfaces.  However, Human Resources plays a significant role in the protection of sensitive information in all stages of an employment life cycle. Typically, Human Resources’ activities related to Information Security are categorized Read more…

Incident Response Testing

In the previous bulletin, we offered guidance on preparing and developing a plan to prepare for and address an information security incident, should it occur.  Once the plan has been developed, how do we verify that it is effective and will operate as planned?   In order to understand if Read more…

Incident Handling

We implement controls to prevent security incidents.  Despite these efforts, Information Security Incidents occur.  These incidents can be caused by both internal and external factors and can be unintended or intentional.   There are generally four stages in the incident life cycle: Preparation – To prepare, we work to prevent Read more…

Cybersecurity Awareness Month 2023

Every year in October, we observe Cybersecurity Awareness Month.  Many companies leverage this opportunity to provide additional training and other valuable resources to protect their information and continue to create a culture of awareness.   As you consider how to educate yourself and your workforce, think about the current threats Read more…

Network and Data Flow Diagrams

Documentation is one of the least favorite activities in IT.  It always seems to get prioritized down in lieu of other more critical and current activities.  However, in the process of establishing a strong cybersecurity posture, one of the key documents that should be created and maintained is a Network Read more…