Test Your Incidence Response Plans

So we all must have an Incidence response plan, which is only used after a computer security problem: Detect problem Investigate problem What type of the threat to the business? Does it rise to level of “Breach”? With significant legal disclosure requirements Did the attackers steal information/data?   We know practice makes perfect, but how … Read more

How are Hackers Always a Step Ahead of Defense?

So the Defense (also known as Blue team) has been inundated with spam, the goal of the spam(for the hackers) is for an unsuspecting user to give up their credentials(username and password). Hackers are always trying to get your usernames and passwords. Opening a word document? What if it included a small file that is … Read more

NIST 800-171 Compliance Can be Done Quickly!

NIST 800-171 Compliance actually means DFARS Cybersecurity requirements must be met. The NIST 800-171  requirements have always vexed small manufacturers due to the specific wordiness, so the NIST (National Institute of Standards and Technology) has been trying to make this easier to understand with the following pdf: https://nvlpubs.nist.gov/nistpubs/hb/2017/NIST.HB.162.pdf This is an important paragraph: from pdf Executive … Read more