Analecta Cyber Company Blog

2018-12-04

When a Locked Door Isn’t Enough: Controlling Physical Access to Information Systems

being secure enough - dog in front door graphic Controlling physical access to information system banner - Analecta LLC graphic It is vital to keep attackers from finding ways to access your data remotely, but it is equally important to keep them from exfiltrating data through direct physical access. Physical security should safeguard your equipment, resources and other assets to ensure that only authorized personnel have access to those company assets.

2018-11-27

Cloud Computing and Storage Technology That’s Down to Earth

Cloud computing and storage technology - aerial shot of the building Cloud computing and storage technology banner - Analecta LLC Cloud computing yields a pivotal shift in sophisticated data storage and technology from more conventional ones. According to Forrester’s 2018 Predictions, there is a $178B (yes, that’s a “B”) market on the current global public cloud platform, which is predicted to rise at a yearly rate of 27% over the next several years. How do cloud servers compare, are they worth it in the long run, and will they be an asset to your company?

2018-11-20

Protecting Your Network From Ransomware

Ransomware victim screen - Analecta LLC Screen Protecting your network from ransomware banner - Analecta LLC GraphicAs if protecting your network from malware: viruses, trojans, worms, etc. isn’t enough...

Ransomware is a form of malicious software that denies the target the accessibility of information. The attackers usually promise to return access to the files after you have paid a ransom - often through bitcoin or other anonymous currencies.

2018-11-13

Identify Your Critical Services, Functions and Dependencies

Identify your critical services, functions and dependencies - Analecta LLC Graphic Identify critical business services, functions and dependencies Banner - Analecta LLC Graphic Small and medium-sized businesses may still not see themselves as fantastic targets for hackers to exploit. However, hackers pursue targets that pose the least amount of risk to their operations, which often means targeting many smaller, less protected organizations. Businesses of all sizes need to identify their critical services and supporting critical functions and dependencies when planning their security strategy.

2018-11-06

Where Does Your Company Fit in Critical Infrastructure?

critical infrastructure power lines graphic - Analecta LLC Where does your company fit in critical infrastructure banner - Analecta LLC Small and medium-sized businesses (SMBs) play a significant role in not only our nation’s economy but also the personal lives of those in the community. Many of these SMBs make up portions of the U.S. critical infrastructure. The NIST cybersecurity framework charges companies with the task of understanding where their organization fits within its environment to better inform cybersecurity and risk management decisions. Specifically, organizations need to: