Buying a risky or vulnerable company is avoidable, and what you don't know can hurt you. Even with insurance or financial indemnification, cybersecurity breaches represent significant capital investment and brand risk. Cyber-related compliance requirements are often poorly understood, difficult to detect, introduce reputational risk, and cost time lost with outside auditors.
Brandon Blankenship
Recent Posts
Top 4 Cybersecurity Risks of Mergers and Acquisitions (M&As)
5 Steps to Creating a Cybersecurity Incident Response Plan
Incident Response (IR) is the way your team reacts to an occasion of data insecurity. A cybersecurity incident is an event that threatens your operation's data or systems. Incidents might include malware infections, data breaches, unauthorized access, or any activities that compromise your computer systems' or networks' security.
One of the more difficult and time-consuming projects in info-sec is data classification. It’s especially difficult if you’re on a budget - which every company is. When an organization is fairly new to the security and risk driven mindset and must prioritize their efforts to achieve the most bang for their buck; Data Classification is often near the bottom of the list.
Before a company starts down the path of information security, there’s often a looming feeling that something isn’t right and that the steps to fix it will take effort. I liken it to a messy room that they’ve simply closed the door on, so they can try to forget there is a mess to clean up. Every time they walk by the room, they feel a twinge of embarrassment or a spark of motivation to tackle the problem; however, that emotion lessons every time they walk by until the feeling evaporates. Now the messy room has been “normalized.”
Getting Ready for CMMC – Capability Maturity Model Certification
If you’re in the Department of Defense supply chain, you’ve become familiar with DFARS and the corresponding NIST SP 800-171 r1 over the last few years. It is a list of 110 controls that you need to be compliant with in order to continue supplying certain contracts.
Topics: Cybersecurity, Information Security, DFARS, cybersecurity plan, NIST