Here 8 mistakes to avoid when build a successful cybersecurity program for your organization. #achsysadmin #thecybersecuritymindset #alexhubbard #ciso #vciso #sysadmin #cyber #cybersecurity #cybersecurityawareness
This breach is not related to Uber's September incident according to Bleeping Computer, it is a new one. Uber believes this happened through a third-party. This is why it is so critical to have a good third-party vendor review and management program. I've already seen an uptick in clients receiving questionnaires from their clients or vendor asking what they are doing to keep their data secure. This is going to continue as threats become more advance.
#vciso #cybersecurity #breach #uber
Gone are the days where you fill out a questionnaire to get cyber insurance. Providers now want to see things like SOC2 compliance and security hardening activities. Many are reviewing your awareness training programs, security policies and the like.
"Texas-based cloud computing provider Rackspace has confirmed today that a ransomware attack is behind an ongoing Hosted Exchange outage described as an "isolated disruption.""
#vciso #ransomware #cybersecurity
CISA notifications are a great way to get the latest information about vulnerabilities. It's free to sign up! Great way to stay informed. #vciso #ciso #cybersecurity #vulnerabilities #cisa
Having a good third-party management policy and regular review is crucial in today's environment. Additionally, knowing and tracking all of your assets, while tough, is also a critical aspect of a mature cybersecurity program. According to this article, the "average enterprise uses 1400 cloud services". This can be a lot of leg work to track. An asset can be anything from a physical system to a virtual appliance and anything in between. Understanding what your assets are, what their vulnerabilities or weak points might be, can help you develop remediation strategies.
#vciso #cybersecurity #supplychain