Analecta Cyber Company Blog: October 2018

2018-10-30

Fully Understanding the Impact and Potential Cost of a Cybersecurity Incident

understanding the impact of a cybersecurity incident - Analecta LLC graphic Fully Understanding the Impact and Potential Cost of a Cybersecurity Incident - Analecta LLC banner It is a significant challenge to stay ahead of threats to your systems and networks and it is likely that your organization will experience one or more cyber incidents. The NIST cybersecurity framework advocates that organizations fully understand the impact of any incident and that they conduct analysis to ensure that the response has been effective in supporting recovery activities. But what does it mean “to understand the impact of an incident?” 

2018-10-23

Protecting Your Company’s Data with Cyber Insurance

Analecta LLC - Cyber Insurance Puzzle Graphic Protecting your company's data with a cyber insurance policy - Analecta LLC banner Purchasing insurance coverage against cybersecurity incidents is a best practice that all businesses should implement. There are a variety of companies willing to insure your business with various policies, including insurance against costs arising from:

2018-10-16

Cryptographic Hashes: Verifying the Integrity of Your File System Baseline

MD5 and SHA Checksum Utility Graphic Cryptographic Hashes - Verifying the Integrity of Your File System Baseline - Analecta LLC banner Graphic We have discussed the importance of establishing a baseline for data flow across your network and the criticality of identifying abnormal activity before it wreaks havoc on your business systems. The National Institute of Standards and Technology (NIST) recommends IT cybersecurity teams use cryptographic hashes to detect unauthorized changes to software, firmware and information stored on your network.

2018-10-09

Carefully Testing your Antivirus Software on the Web

The site ahead contains malware graphic - Analecta LLC Carefully Testing your Antivirus Software on the Web - Analecta Banner Graphic
The roles of antivirus (AV) software and intrusion detection systems (IDS) are similar and straightforward - to detect malicious activity targeting your systems. NIST Cybersecurity Framework recommends that you test detection processes as a key function of security (akin to testing smoke alarms and fire extinguishers for proper functionality before they are needed). Here we discuss testing your antivirus and IDS to be sure they are functioning properly and protecting your networks.

2018-10-02

Detecting Malware Using a Centralized Antivirus Management System

Malware detected graphic - Analecta LLC detecting malware using a centralized antivirus management system - Analecta LLC banner graphic Previously we touched on the basics of what to do when your antivirus (AV) software indicates that it has found malicious code in the form of a virus, worm or trojan. This foundational knowledge should be seen as a starting point, especially if you own or support a small to medium sized business (SMB). As your business grows to a more complex network setup, you may face additional cyber threats in both quantity and their ability to do permanent damage to your information and your bottom line.