Analecta Cyber Company Blog: July 2018


Restricting Removable Devices on Network Machines Part 2: Disabling Host Machine Ports

Restricting removable devices on network machines - disabling host machine ports - Analecta LLC Graphic banner

Educating and restricting go hand in hand

In Part 1 of our series on Restricting Removable Devices, we discussed the threats caused by removable devices and how to avoid them through user awareness and training. Studies have shown that user behavior is a contributing factor in 70% to 95% of malware infections. Modifying risky behavior through consistent and thorough employee training can reduce these proportions by 45% to 70%.


Restricting Removable Devices on Network Machines Part 1: User Education

administratively restricting removable devices in network machines Restricting removable devices on network machines: user education - Analecta-llc blog graphic Connecting USB thumb drives and other removable devices to company-maintained computers poses a significant risk to your organization’s network. Even allowing employees to plug peripherals into the USB port for charging personal devices may infect their machine and compromising the entire network. This week we turn our focus to the impact user training has on unauthorized USB use in the office


The NIST Cybersecurity Framework Explained

Overview | Identify | Protect | Detect | Respond | Recover | Index

The NIST Cybersecurity Framework Explained - Analecta LLC graphic The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has become an essential resource for U.S. businesses in developing a company-wide cybersecurity program. The guidance can be tailored to businesses of any size and has been recognized by many states and industry associations as a “best practice” for many business types.


Keep Calm and Follow Your Response Plan

Executing your response plan graphic Keep calm and follow your response plan - Analecta LLC Banner Few environments are as stressful and frenzied as what you’ll find during a cyber incident response. All hands are on deck trying to stop an attack while attempting to keep the business operational. Where is the attacker now? What data are they after? Which systems are affected? There are hundreds of questions and rarely absolute answers. Time speeds up and yet somehow slows down at the same time. Each new finding brings new questions.


A Full Program Perspective on Developing Your Recovery Plan

Recovery plan prioritizing fixes - Analecta LLC Graphic Developing your recovery plan - Analecta LLC Banner When a cyber incident strikes your company’s information systems, critical business functions become jeopardized. Depending on your services, clients or customers, losses can be suffered by the hour. The longer it takes to get back on track, the more devastating it can be to the organization.