ProCircular Information Security Experts Corner

Let your Risk Register be your Guide

Posted by Brandon Blankenship on Jan 30, 2019 12:46:00 PM

“What are the top 7 things you can do to protect your business from hackers?”  Have you ever read a list like that on the internet? In the cybersecurity realm, they’re everywhere. I’ve even assembled and presented one of those lists to a group of business owners myself. They tend to point out things like user awareness training, patching and passwords.  All noble things to get your arms around, of course, but are they useful to a client?  Sometimes I feel as though those lists, as true as they are, are about as useful as telling a football team to “score touchdowns”, or “guard the quarterback.” Yeah, I know that scoring touchdowns is good… but how? 

Read More

Topics: it risk assessment, Cybersecurity, cybersecurity plan, NIST, DDOS, HIPAA

From the Front Lines of Malware Detection

Posted by Bryan Prather-Huff on Jan 24, 2019 3:24:18 PM

Everyone has (or should have) an anti-virus solution. It's probably barked at you once or twice for downloading a file from a sketchy website or opening a link from an email you didn't quite recognize. But how does your anti-virus know what programs are bad, and what programs are good?

Read More

Topics: cybersecurity plan, Incident Rsponse, Cybersecurity, Information Security, security incident response, security incident handling, SIEM

DFARS Made Easy

Posted by Brandon Blankenship on Nov 29, 2018 1:29:22 PM

The hot topic for contractors in the DoD supply chain these days is DFARS compliance. DFARS regulations increase our cybersecurity maturity as a country, to better protect ourselves from threats that can disrupt the DoD supply chain.

Read More

Topics: NIST, DFARS

Protecting the Kinds of Data Targeted by Today’s Cyberattacks

Posted by Aaron R. Warner on Oct 25, 2018 3:37:00 PM

Having the right technology should be part of your cybersecurity strategy – but it’s not the only part (and maybe not even the most important part). As an organization’s most valuable asset, investing in people to improve cybersecurity can provide a line of defense that’s tough to find from software or technology.

Read More

Topics: cybersecurity plan, Vulnerability Assessment

Next Year, Budget for the Human Factor in Cybersecurity

Posted by Aaron R. Warner on Sep 28, 2018 5:05:05 PM

It can be overwhelming to think about budgeting for cybersecurity. Where do you start? What do you focus on? How do you know what you need most?

Read More

Topics: budgeting