Analecta Cyber Company Blog


Increase Server Capacity and Bandwidth to Reduce the Effects of DDoS Attacks and Server Crashes

fiber optics cable tube graphics - Analecta cyber Increase Server Capacity and Bandwidth to Reduce the Effects of DDoS Attacks and Server Crashes - Analecta LLC banner
The classic model for cybersecurity focuses on three main objectives, often referred to as the CIA triad: confidentiality, integrity, and availability. Confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people. Let’s take the opportunity to see how small businesses can maintain availability by making sure they have enough network capacity.


Including Cybersecurity in Human Resources Practices

Employee screening cybersecurity in human resources practices Including cybersecurity in Human Resources Practices - Analecta Cyber graphic banner Business owners may not consider their Human Resources (HR) department to be a vital component of the cybersecurity picture, but their day-to-day business practices have a direct impact on the protection of a company’s most sensitive data. HR professionals manage and protect personally identifiable information (PII) data - the most sought-after resource for criminals involved with identity theft. They also play a critical role in the hiring and termination of employees and can protect the organization from an insider threat.


Take Charge Over the Masses: Administratively Disable Macros

Trust center dashboard office 365 - Macro settings NIST Cybersecurity Framework Protect - Administratively Disable Macros Many companies access Microsoft Office or Adobe documents on a daily basis. Whether it is a PowerPoint presentation on the next quarter’s sales forecast, a budget worksheet in Excel, or a PDF of a technical manual, these documents come through our email and reside on shared drives. Users may not think twice about opening a document, especially one that appears to come from a trusted or expected source. The problem is that all of these types of files can have embedded macros that can run malicious code without the user’s knowledge.


Who is Installing Software on YOUR Computers?

Restricting software on domain controllor computer - Analecta Cyber graphic
Analecta Cyber banner graphic - Who is installing software on your computer
As important as it is to keep software updated and properly patched, it is also important to control which software is allowed on your machines. Without the right controls in place, personnel may be tempted to install unapproved software on your organization’s systems. This could introduce an unacceptable amount of risk to your devices and make them vulnerable to attack.


Are you Managing the Risk Management Process?

NIST risk management framework graphic Cyber Risk management strategy - Analecta LLC banner On December 20, 2018, the National Institute of Standards and Technology (NIST) released the final version of its NIST Special Publication 800-37 Revision 2, a Risk Management Framework (RMF) addressing both security and privacy concerns in IT risk management. This update connects the RMF with NIST’s well-known Cybersecurity Framework (CSF), highlighting relationships that exist between the two documents.