It is time to get back to basics, and to really detail out your plan of attack. We invite you to read our ‘Back to Basics – How to Protect your Organizational Assets and Confidential Information. It is provided as a guideline only, however if you do have any questions, or would like some additional information please feel free to contact me directly. Getting_Back_to_Basics
Nearly two-thirds of organizations are already infected with bots
22 February 2013
70% of those infections communicate with their C&C servers at least once every two hours, and more than half of organizations across the globe have had malware downloaded onto their networks via these bots.
This is the shocking result of an analysis by Check Point of 888 public and private organizations worldwide, drawing information from its Check Point ThreatCloud, its global network of threat sensors, and 3D Security Reports conducted at those organizations during 2012. [Read More]
How To Conduct An Effective IT Security Risk Assessment
[Excerpted from “How to Conduct an Effective IT Security Risk Assessment,” a new report posted this week on Dark Reading’s Risk Management Tech Center.]
Many security and compliance projects begin with a simple idea: assess the organization’s risk of vulnerabilities and breaches. Indeed, implementing an IT security risk assessment is absolutely critical to the overall security posture of your organization.
An effective security risk assessment can prevent breaches, reduce the impact of realized breaches and keep your company’s name from appearing in the spotlight for all the wrong reasons. Regular IT security risk assessments also enable organizations to build up a cache of historical data that can be used to effectively gauge and communicate monetary impact related to risks -and, hopefully, convince upper management to take decisive action to reduce the organization’s threat surface.
It’s important to note that not every IT security risk assessment is alike — or even remotely close. Indeed, there are many ways to perform IT security risk assessments, and the results may vary widely depending on the method used. It should also be noted that performing a risk assessment is a very small part of the overall risk management process.