Network Armor News Summer 2014

It’s 2014. Do You Know Where Your Data Is?

SUMMER2014You have racks of servers and migrate data religiously to the cloud and off-site storage. Your IT staff builds a firewall and posts a guard. Your commitment to network security is unparalleled in the industry. That’s the good news. The bad news? Security is always about the weakest link. (more…)

ICS Protects CIA

Okay, so it’s probably nSUMMER2014ot the CIA you’re thinking of. This CIA is potentially even more vital to the success of your business or organization than the one with the secret agents and covert operations. CIA is an acronym used in the cyber community to characterize security,* and it serves as a good starting point in exploring the important role ICS can play in protecting your team’s vital network infrastructure. (more…)

2013-14 ANNUAL PLANNING TO OPTIMIZE INFORMATION SECURITY

winter2013This free resource offers a systematic approach to annual IT security planning efforts, including information security risk assessment, vulnerability assessment, web application assessment and penetration testing. (more…)

DOES YOUR ORGANIZATION HAVE A RISK ACTION PLAN?

spring2013(Can you afford not to?)
Targeted attacks, human and system errors, structural failures, operational disruptions due to natural disasters… These events are in the news every day.They compromise the confidentiality, integrity, and availability of information systems, and have tremendous adverse affects on organizational operations, assets, and people. These affects can even endanger other organizations and national interests. You know your organization needs to defend against these threats, but the realities of budgeting often get in the way. (more…)

ANNUAL PLANNING TO OPTIMIZE ENTERPRISE INFORMATION SECURITY

winter2012At one time, information security was as simple as a unique ID and the watchful guard of the onsite ops team. But the threats your organization faces today are unseen and uncontained, and increased demands of regulators present challenges unmatched at any previous point in time. A strategy as simple as those employed in the early days will result in fireworks–just not the kind you typically enjoy when ringing in the new year. (more…)

RISK ASSESSMENT CAN IMPROVE YOUR BOTTOM LINE

fall2012Today’s headlines show businesses and government agencies increasingly falling victim to costly data leaks. Compare the average cost of a comprehensive risk assessment ($25,000 – $50,000) to the average breach (around $6.75M in a typical data loss event), and the choice is clear. Your organization cannot afford to simply “hope you won’t be breached”. Studies show 96% of all organizations will experience a costly breach in the next 24 months. Don’t let your organization be one of them. Be secure; find out where your vulnerabilities exist and close them today. (more…)

ENSURING BUSINESS CAN CONTINUE DURING A TIME OF CRISIS

summer2009A disaster can be defined as (1) an event that causes serious loss, destruction, hardship, unhappiness, or death; or (2) somebody or something that fails completely, especially in a way that is distressing [or] embarrassing. Source: Encarta Dictionary. All too often, business owners and CEO’s consider a disaster such an unlikely event that they do not prepare their organizations adequately for continuity of operations. Recent news stories, such as the Gulf oil spill, show how painfully devastating that approach can be. But what about your business? If a natural disaster happened tonight, destroying your main office, then what? Would your employees know what to do to keep operations going? Would your customers or clients have to go elsewhere for the services that you provide? How quickly could you recover basic I.T. functions in accounting, human resources, and customer service? (more…)

EVALUATING AN INFORMATION SECURITY FIRM?

spring2009
Choosing the right information security firm is as important for your organization as choosing the right accounting firm or the right legal team…
In fact, taking the time to choose wisely now can save countless resources later. Here are just a few things to consider when choosing an information security firm.
(more…)

GET WELL PLAN: THE INFORMATION SECURITY RISK ASSESSMENT

winter2011An Information Security Risk Assessment is a means of examining your IT infrastructure to identify vulnerable areas in the network and provide steps to secure them. Source: Encarta Dictionary. Risk assessments are crucial in validating your company’s security policy, procedures, and infrastructure. This service provides a high-level overview of network security strengths and weaknesses, as well as a detailed analysis of network-connected resources. The risk assessment is often the first step in evaluating your overall security posture. We have said before that a Risk Assessment is similar to checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would never consider leaving those doors and windows open. But beyond the entryways that are easy to see, are there other access points that are not so obvious?  (more…)

RESOURCES YOU DIDN’T EVEN KNOW YOU HAD

fall2011As 2011 rapidly comes to a close, do you have projects that are left unfinished? Projects 1-10 have been successfully implemented, but what about that one you’ve been putting off? What about Project 11? Is there room in the budget to complete it before year-end? What about staff? Planning and managing your financial performance is essential to any business. Year-end brings enough stress of its own. Don’t let Project 11 bog you down; ICS can help you find resources you didn’t even know you had so you can finally check project 11 off the list. (more…)

IS THE AIR CONDITIONER BROKEN? NO, THE BUILDING WAS JUST ON FIRE

summer2011This actually happened at ICS recently. A fire in the basement had everyone evacuated from the downtown highrise and about 7 firetrucks surrounding the building within minutes of the alarm. We immediately enacted our disaster recovery plan. (more…)

#1 WAY TO EARN A RAISE IN 2011…

spring2011You’re ready to execute on projects 1 through 10, but to really make a difference PROJECT 11 needs to be completed. You need to be able to demonstrate to your managers that you can get more accomplished in less time with the same resources. At this point, you need to don your supersuit and make some magic happen. (more…)

PLANNING YOUR 2011 I.T. SECURITY STRATEGY

winter2010How long has it been since your organization conducted an independent security audit? Do your networks and systems meet your security and reliability benchmarks? Which industry standards have you selected as the foundation for your security program? If you haven’t formulated answers to these questions, or if you are uncomfortable with your responses, it may be time for you to perform an I.T. security health check. (more…)

HOW MUCH OF YOUR DATA WILL WALK OUT OF THE BUILDING TODAY?

fall2010Experts estimate that up to 60% of corporate data resides on endpoint devices such as PC’s and laptops rather than on centralized, managed servers within an organization. Data leaks can occur at endpoints more easily and frequently because removable media (thumb drives/flash drives, CD/DVD media, email attachments, printers, iPods, camera cards, etc.) are typically not monitored, managed or protected. Businesses and government agencies increasingly become victims of costly data leaks that start with such devices or innocent activities such as IM or email. The average data leak costs an organization over $200 per record lost. On average, this totals over $6.6M in an average data loss event. (more…)

IT SECURITY FUNDAMENTALS: INFORMATION SECURITY RISK ASSESSMENT

summer2010You’ve heard the term Risk Assessment often enough. But cutting through the IT-speak, what is it exactly? What does it encompass?
Consider a risk assessment like checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would never consider leaving those doors and windows open. But beyond the entryways that are easy to see, are there other access points that are not so obvious? Is your network at risk of experiencing a devastating breach?

An Information Security Risk Assessment will provide your organization with an objective evaluation of the security of your information infrastructure. It is your organization’s first step in your IT Security Health Check and Get Well Plan. (more…)

BEYOND NATURAL DISASTERS: THE INFORMATION SECURITY RISK

spring2010Natural disasters such as hurricanes, tornadoes and earthquakes are only part of the risk to your business continuing to operate. There are also information security risks.
These days, threats can come from anywhere. Businesses with event the most well-thought out business continuity plans must monitor and re-evaluate their plans every 12-24 months. It takes a combination of current backups, disaster recovery plans, and high-availability tools to maximize uptime and ensure your business can address emerging threats. (more…)

NO ONE WANTS TO GET THE 2AM CALL

winter2009You know the one. It goes something like:
…we’ve been hacked ….records leaked …personal information exposed …how could this have happened …may prove financially devastating to the organization… Taking a few simple steps could not only help ensure both your network and your budget are secure – it could also keep you from getting the 2am call. (more…)

IS THE ECONOMY REALLY YOUR BIGGEST RISK?

fall2009Have you looked at your business continuity plan, lately? According to The National Archives & Records Administration, 93% of organizations that experienced an Information Technology service outage for more than 9 days reported bankruptcy within 12 months; 50% were bankrupt immediately.
Well-developed business continuity plans, built upon a policy developed to support organizational business goals and objectives, can allow your business or organization to be prepared for interruptions of any kind: power failures, IT system crashes, natural disasters, supply chain problems and more. Natural disasters such as hurricanes, tornadoes and earthquakes are only part of the risk, alongside information security risks. The chances of a data center experiencing a security breach are higher than the chances of it catching on fire. Threats can come from anywhere on the Internet, which dictates the need for constant monitoring and re-evaluation of plans once they are in place. (more…)

HOW ARE YOU GOING TO PREPARE?

summer2012The thing about disasters, whether natural or man-made, is that their timing is virtually impossible to predict. Last year, we told you about a fire in ICS headquarters building. Fire crews evacuated everyone while they ensured the fire was put out and all were safe. That was nothing compared to recent headlines portraying tornadoes ravaging the South, Midwest and Eastern seaboard; wildfires raging across several states; hurricanes and earthquakes devastating metropolitan cities across the globe.  (more…)

Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor