Risk Analysis Gone Wrong?

Since a picture says a thousand words here is an attempt at explanation of Risk Analysis. The rows are “Impact on Environment”: none, minimal, minor, significant, major, critical The “Likelihood” or “Likely – what is % to happen” is  the columns: not likely, low, medium, medium-high, high, will happen. These are not “real” systems in … Read more

Compliance vs Framework

Is it better to focus on compliance or a on a framework system? I.e. PCI or HIPAA compliance versus ITIL or COBIT for example. There are more regulations coming so let’s add a couple of the US based ones. SHIELD(Stop Hacks and Improve Electronic Data Security) and CCPA(California Consumer Privacy Act). SHIELD – Stop Hacks … Read more

Threat Hunting in Your Network

We should hunt for threats in our network – i.e. find possible attacks in our network to see what is being attacked and whether we  can start to counter the attacker’s moves. In case you don’t know below is the ATT&CK MITRE framework green highlights are the items you may want to pay attention to. … Read more

Happy 4th of July Holiday!!

Kalo Mina = Have a good month in Greek. So remember to do some major backups on Holidays (always good to at least do 2 major backups per year.  I like to do them on holidays like the 4th of July and Christmas for example. So before watching the fireworks and more – do a … Read more