Colleges and universities face some unique challenges when it comes to building a cyber security program. From an ideological standpoint, university campuses are founded on the concept of the free and open exchange of ideas and information. However, universities today must balance this with the day-to-day reality of securing a vast range of critical data… Read More
Category: Cyber Security Strategy
Nevada Leads by Example in State and Local Government Cyber Security Practices
The International City/County Management Association (ICMA) partnered with the University of Maryland a few years ago on a nationwide survey of local government cyber security practices, including incident response (IR) plans. Among the many interesting data points in the published report was the finding that only 33.7 percent of respondents had a “formal, written plan for recovery from breaches.” Of… Read More
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Three
Servers and Vulnerability Management In part three of our blog series on the importance of keeping technology and operating systems updated as part of your vulnerability management program, I’ll focus on servers. Servers are a critical component to your security plan, just like mobile devices and unsupported operating systems are. Servers provide key support for… Read More
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two
Mobile Device Vulnerability Management In part two of our blog series on why it’s important to keep technology and operating systems updated as part of your vulnerability management program, I’ll focus on mobile device vulnerability management. This includes mobile computing, with a focus on mobile devices. The popularity of mobile devices, along with how easily they can… Read More
Third-Party Assessments: What to Expect and Why They Can Benefit You
In this week’s blog we share an overview of third-party assessments for cyber security. We cover why they’re beneficial and what to expect. Lauren Bellero spoke to Sean Falconi, a managing consultant with Delta Risk in risk management and compliance, to get his thoughts on this topic. Sean has performed many third-party assessments covering a wide range… Read More
Tech Refresh as Part of an Effective Vulnerability Management Program: Part One
The topic I’m going to focus on today is updating outdated operating systems and other aspects of tech refresh as part of vulnerability management, which is one of the most critical tasks for a cyber security professional. This task comes in at #3 on the Center for Internet Security’s (CIS) Top 20 control listing. While vulnerability management is listed as a… Read More