Jan082021 The Myth of (Non)Compliance Jeremy Rasmussen | 5 Minute Read Guess what? You’re going to be compliant with something… In certain sectors, we’ve heard the claim that there’s really no industry standard or governmental regulation regarding cybersecurity....
[post_published] [post_title] [post_author] [acf field=”length_of_read”] [minute_read] When establishing your organization’s cybersecurity and compliance programs, no organization should start empty-handed. There are a wide range of security processes,...
Dec212020 Establish a Risk Management Function Bryan Graf | 2 Minute Read You must assign risk management responsibility and authority to either an individual or a department within your organization. It is a vital step in establishing a cybersecurity and compliance...
Dec152020 Lessons Learned From FireEye and SolarWinds Breach Lessons learned from Fireeye and Solarwinds breach Jeremy Rasmussen | 6 Minute Read “In preparing for battle, I have always found that plans are useless, but planning is indispensable.” – Attributed to...
Nov102020 Remote Desktop: You’re Opening the Floodgates for Hackers Jeremy Rasmussen | 5 Minute Read Once is a fluke. Twice a pattern. But when you see something dozens of times, it’s a bona fide trend. Abacode has seen Remote Desktop Protocol (RDP, IANA port 3389)...
Oct282020 How to Use Your Planning Cycle to Reinforce Your Cybersecurity Bryan Graf | 3 Minute Read Every organization has a planning and budgeting cycle. Planning is what enables organizations to prepare for the future, address and manage opportunities and threats,...
Recent Comments