Analecta Cyber Company Blog: March 2018

2018-03-25

Implementing Secure Administrator Best Practices: Using the Principle of Least Privilege

Privileged account credentials for local, root, superuser and domain administrator accounts are the Achilles’ heel for any information-based business. A deployment of defenses can be quickly destroyed if these critical accounts are compromised by a malicious network attack or hackers determined to wreak havoc.

2018-03-15

Communicating Your Company’s Mission, Objectives and Activities for Optimal Cybersecurity

Communicating your company's mission, objectives and activities for optimal cybersecurity - Analecta LLC Graphic Communicating Your Company’s Mission, Objectives and Activities for Optimal Cybersecurity Security leads must understand the overall purpose and goals of the organization to better protect your company’s most vital assets.Your organization’s mission is important and is probably well understood by company leaders, but do your cybersecurity personnel understand it to the same degree? Cybersecurity professionals need to understand the mission in order to help prioritize their efforts in securing the IT infrastructure.

2018-03-06

Making Sense of the NIST Cybersecurity Framework: Why you need an asset inventory for managing cyber risk

Making Sense of the NIST Cybersecurity Framework: Why you need an asset inventory for managing cyber risk

Creating your first device inventory to manage your assets


As you move toward adopting the National Institute of Standards and Technology (NIST) Cybersecurity Framework in your organization, one of the first items you will encounter is the need to identify assets that require protection. Having a detailed understanding of what a component does, where it fits into the organization’s information system, and its potential vulnerabilities goes a long way toward protecting your assets. But managing IT assets and conducting device inventories is more than just tracking hardware and sub-components.