Analecta Cyber Company Blog


Putting Information Security on Everyone’s Mind

Puting information security on everyone's mind - Analecta LLC graphic banner Employees are one of the biggest threats to your company’s information system security. This isn’t a matter of insider threats or malicious actions to sabotage the company; it’s from accidental, unrealized actions that occur on a daily basis:
  • Forgetting to lock their computer
  • Poor password management
  • Opening malicious email attachments
  • Downloading unauthorized software


Restricting Removable Devices on Network Machines Part 2: Disabling Host Machine Ports

Restricting removable devices on network machines - disabling host machine ports - Analecta LLC Graphic banner

Educating and restricting go hand in hand

In Part 1 of our series on Restricting Removable Devices, we discussed the threats caused by removable devices and how to avoid them through user awareness and training. Studies have shown that user behavior is a contributing factor in 70% to 95% of malware infections. Modifying risky behavior through consistent and thorough employee training can reduce these proportions by 45% to 70%.


Restricting Removable Devices on Network Machines Part 1: User Education

administratively restricting removable devices in network machines Restricting removable devices on network machines: user education - Analecta-llc blog graphic Connecting USB thumb drives and other removable devices to company-maintained computers poses a significant risk to your organization’s network. Even allowing employees to plug peripherals into the USB port for charging personal devices may infect their machine and compromising the entire network. This week we turn our focus to the impact user training has on unauthorized USB use in the office


The NIST Cybersecurity Framework Explained

Overview | Identify | Protect | Detect | Respond | Recover | Index

The NIST Cybersecurity Framework Explained - Analecta LLC graphic The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has become an essential resource for U.S. businesses in developing a company-wide cybersecurity program. The guidance can be tailored to businesses of any size and has been recognized by many states and industry associations as a “best practice” for many business types.


Keep Calm and Follow Your Response Plan

Executing your response plan graphic Keep calm and follow your response plan - Analecta LLC Banner Few environments are as stressful and frenzied as what you’ll find during a cyber incident response. All hands are on deck trying to stop an attack while attempting to keep the business operational. Where is the attacker now? What data are they after? Which systems are affected? There are hundreds of questions and rarely absolute answers. Time speeds up and yet somehow slows down at the same time. Each new finding brings new questions.