Data is difficult!
Read More: Data is difficult!Know your Data? (link below)….. Data is difficult, Categorising and securing Data is difficult, I personally rate this as a 4 or 5 out of 5 stars in my Cyber Security complexity Framework. Meaning that it is my opinion that this is not the place that most organisations looking to reduce their Cyber Risk should…
Marketectures are not what the Client Needs
Read More: Marketectures are not what the Client NeedsThe recent security reference architecture document recently released by Microsoft is a glaring indictment of where the Cyber Security industry is in 2021. A Sprawling cityscape of Vendors Spruking their “Better Mouse Traps” (Thanks Bryan). Organisations have massive spaghetti junctions of interconnecting applications, services, users and platforms. Familiar with the below? this was my life…
Work from home? hacking is cheap to start out in
Read More: Work from home? hacking is cheap to start out inComing back to what I have discussed before, it is really cheap to get started as a “Wannabe” haxxor…… just search Reddit for red teaming and join the groups for public “Proof of Concept” hacks for each new vulnerability as it is announced (seriously!) ……. There are two solutions to this, either may be suitable:…
Find a Vulnerability in Software, Get sued by Vendor
Read More: Find a Vulnerability in Software, Get sued by VendorBad form or what? Find a Vulnerability, notify the vendor, get sued! IMHO, many vulnerabilities are not published already, and this only makes it worse….. sell the vulnerability on the Dark Web = profit. Let the Vendor know about it ….. get punished? Reason #233 for having a Cyber Security plan in place to protect…
Data Incontinence – when leaks sneak out
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
Read More: Data Incontinence – when leaks sneak outTo prevent data being used against you in the future either through competitive, intellectual or malicious usage or publication? What should you do?
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
Artificial Intelligence – Managed Detection and Response
Read More: Artificial Intelligence – Managed Detection and ResponseTwo buzzwords applied to almost all Cyber Security companies products today are: Artificial Intelligence and Machine Learning or AI and ML. What exactly the AI or ML technology in these solutions and managed service offerings we consume are providing, is open to debate; as is the depth of implementation and integration. However there are great…
101 Cyber security primer
Read More: 101 Cyber security primerCyber Security assessments are critical to understanding where your organisation is maturity wise.
Customer ignores MSP advice and is breached?
Read More: Customer ignores MSP advice and is breached?In the case of ever increasing and tightening reporting requirements and breached clients potentially being sued for damages, it is your reputation as the MSP that will be affected in a blame game scenario.