Analecta Cyber Company Blog: March 2019

2019-03-19

Increase Server Capacity and Bandwidth to Reduce the Effects of DDoS Attacks and Server Crashes

fiber optics cable tube graphics - Analecta cyber Increase Server Capacity and Bandwidth to Reduce the Effects of DDoS Attacks and Server Crashes - Analecta LLC banner
The classic model for cybersecurity focuses on three main objectives, often referred to as the CIA triad: confidentiality, integrity, and availability. Confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people. Let’s take the opportunity to see how small businesses can maintain availability by making sure they have enough network capacity.

2019-03-12

Including Cybersecurity in Human Resources Practices

Employee screening cybersecurity in human resources practices Including cybersecurity in Human Resources Practices - Analecta Cyber graphic banner Business owners may not consider their Human Resources (HR) department to be a vital component of the cybersecurity picture, but their day-to-day business practices have a direct impact on the protection of a company’s most sensitive data. HR professionals manage and protect personally identifiable information (PII) data - the most sought-after resource for criminals involved with identity theft. They also play a critical role in the hiring and termination of employees and can protect the organization from an insider threat.

2019-03-05

Take Charge Over the Masses: Administratively Disable Macros

Trust center dashboard office 365 - Macro settings NIST Cybersecurity Framework Protect - Administratively Disable Macros Many companies access Microsoft Office or Adobe documents on a daily basis. Whether it is a PowerPoint presentation on the next quarter’s sales forecast, a budget worksheet in Excel, or a PDF of a technical manual, these documents come through our email and reside on shared drives. Users may not think twice about opening a document, especially one that appears to come from a trusted or expected source. The problem is that all of these types of files can have embedded macros that can run malicious code without the user’s knowledge.