Analecta Cyber Company Blog


Finding Additional Resources for Threat and Vulnerability Information

Finding additional resources for threat and vulnerability information - Analecta LLC banner

Analecta Cyber’s May 2018 Collaborating with Threat Sharing Groups article was well received by our readership. We expand on the idea that collaboration improves your overall industry, as well as your individual business. Here we review other resources available that will help you improve your company’s cybersecurity posture. 


Data Classification 101: Protecting Data Based on the Function It Serves

Data Classification 101 - The Basics - Analecta LLC Graphic The NIST Cybersecurity Framework calls upon business owners and IT managers to ensure that “resources are prioritized based on their classification, criticality and business value.” Classification may be simple to understand in terms of hardware and devices, but may not be intuitive when it comes to data. 


Putting Information Security on Everyone’s Mind

Puting information security on everyone's mind - Analecta LLC graphic banner Employees are one of the biggest threats to your company’s information system security. This isn’t a matter of insider threats or malicious actions to sabotage the company; it’s from accidental, unrealized actions that occur on a daily basis:
  • Forgetting to lock their computer
  • Poor password management
  • Opening malicious email attachments
  • Downloading unauthorized software


Restricting Removable Devices on Network Machines Part 2: Disabling Host Machine Ports

Restricting removable devices on network machines - disabling host machine ports - Analecta LLC Graphic banner

Educating and restricting go hand in hand

In Part 1 of our series on Restricting Removable Devices, we discussed the threats caused by removable devices and how to avoid them through user awareness and training. Studies have shown that user behavior is a contributing factor in 70% to 95% of malware infections. Modifying risky behavior through consistent and thorough employee training can reduce these proportions by 45% to 70%.


Restricting Removable Devices on Network Machines Part 1: User Education

administratively restricting removable devices in network machines Restricting removable devices on network machines: user education - Analecta-llc blog graphic Connecting USB thumb drives and other removable devices to company-maintained computers poses a significant risk to your organization’s network. Even allowing employees to plug peripherals into the USB port for charging personal devices may infect their machine and compromising the entire network. This week we turn our focus to the impact user training has on unauthorized USB use in the office