SMEs from the Ponemon Institute to the major cyber majority watch groups that the root cause of a data breach is from the Insider Threat.

[vc_row type=”grid” video_bg=”” css=”.vc_custom_1631738067947{margin-top: 60px !important;}”][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]BTW September is National Insider Threat Awareness month. SMEs that train the Insider Threat tell us that we should begin by performing a companywide risk assessment that focuses on the people that come in contact with our data. We just did a NIST 108 control review using their v1.1 guideline in the last 16 hours over the weekend for a local organization. In the assessment, we find that many organizations send their data on purpose to the cloud (a data server) and they do not know where that is (geographically). As we continue, many times the accounting, intellectual property, and customer data is outside the borders of our country and the business does not maintain a local copy in the US. So, in their Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP), their business is dependent that these countries get along with the US. In the era of international friction and trade wars, that might not be the best plan. The other issue is that in some of these nations, the country’s government actively pursues to take US data. So, if your data is in their country, you can almost guarantee that it has been compromised locally. So, what should we do this month? Start with the NIST assessment and concentrate on the Insider Threat. Those are the people, technicians, and companies that come into contact with your data. After 2 days of identifying vulnerabilities, you can list all of them from high, to medium, to low impact on your business. Then start addressing them. After 90 days, you will be in better shape. If it is your first experience with NIST, do not worry, because slowly and surely, like with the DoD CMMC program, the NIST CSF will become the national standard for cybersecurity.[/vc_column_text][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]Related article: Google reportedly gave some users’ data to Hong Kong authorities in 2020 – The Verge[/vc_column_text][vc_empty_space][vc_column_text dp_animation=””]

SMEs from the Ponemon Institute to the major cyber majority watch groups that the root cause of a data breach is from the Insider Threat. The inside threat to your data is those non-compliant employees, technicians, and third party vendors that you have agreed to letting them have access to your daily regularly. ISO and NIST certified TechR2 products and services expertly combat the Insider Threat.

[/vc_column_text][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

Tags

What do you think?

Related articles

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Read more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Read more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Read more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation