PRODUCING YOUR NETWORK SECURITY POLICY

NONE | April 26, 2016

article image
"Network security experts agree that well-run corporations need a written security policy. The policy sets
appropriate expectations regarding the use and administration of corporate IT assets. However, the conventional
w isdom holds that composing and maintaining these documents bog down in a morass of bureaucratic
inefficiency and pointless wrangling, which never ends and produces nothing useful. "

Spotlight

Cimpress

Cimpress (Nasdaq: CMPR) is the world leader in mass customization. Our unmatched technology, production and supply chain operations allow us to offer products that can be personalized by an individual customer and manufactured on demand: easily, with great quality, and at affordable prices. Whether its customized apparel, marketing materials for a business, or personalized photo products commemorating cherished family moments, we are making customized products accessible and affordable to everyone.

OTHER ARTICLES

A 4 Step Guide to Stronger OT Cybersecurity

Article | April 14, 2020

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time. Industrial control system (ICS) networks are categorized as high risk because they are inherently insecure, increasingly so because of expanding integration with the corporate IT network, as well as the rise of remote access for employees and third parties. An example of an IT network within a control system is a PC that’s running HMI or SCADA applications. Because this particular PC wasn’t set up with the initial intention of connecting to IT systems, it typically isn’t managed so can’t access the latest operating system, patches, or antivirus updates. This makes that PC extremely vulnerable to malware attacks. Besides the increased cyberthreat risk, the complexity resulting from IT–OT integration also increases the likelihood of networking and operational issues.

Read More

Wormable, Unpatched Microsoft Bug Threatens Corporate LANs

Article | March 11, 2020

Microsoft is warning on a wormable, unpatched remote code-execution vulnerability in the Microsoft Server Message Block protocol – the same protocol that was targeted by the infamous WannaCry ransomware in 2017.The critical bug (CVE-2020-0796) affects Windows 10 and Windows Server 2019, and was not included in Microsoft’s Patch Tuesday release this week. The bug can be found in version 3.1.1 of Microsoft’s SMB file-sharing system. SMB allows multiple clients to access shared folders and can provide a rich playground for malware when it comes to lateral movement and client-to-client infection. This was played out in version 1 of SMB back in 2017, when the WannaCry ransomware used the NSA-developed EternalBlue SMB exploit to self-propagate rapidly around the world.

Read More

5G and IoT security: Why cybersecurity experts are sounding an alarm

Article | March 2, 2020

Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million device connections on a private 5G network. All of this leads to more innovations and a significant change in how we do business. But 5G also creates new opportunities for hackers.Gartner predicts that 66% of organizations will take advantage of these benefits and adopt 5G by 2020 — with 59% of them planning to use 5G to support the Internet of Things across their business. Already, manufacturers including Nokia, Samsung, and Cisco have either started developing 5G enterprise solutions or have publicly announced plans to do so. In the enterprise, full deployment of private 5G networks will take time, as it requires significant investments to upgrade legacy network infrastructures, observers say. In the meantime, there are instances of devices in the workplace already operating on a 5G network.

Read More

Coronavirus and the Cybersecurity Threat Landscape

Article | March 4, 2020

Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will hit every organization, no matter how resilient they thought they were. No single event to date has changed the tech threat landscape more than the consequences and impacts developing around the Coronavirus (aka SARS-CoV-2 and the disease CoViD-19). Then there are the business consequences, such as the sudden changes in consumer patterns and steep loss of income. The coronavirus is unmistakably a black swan event. It falls outside of the outliers. It creates a situation that many security professionals are familiar with: The Medusa Effect.

Read More

Spotlight

Cimpress

Cimpress (Nasdaq: CMPR) is the world leader in mass customization. Our unmatched technology, production and supply chain operations allow us to offer products that can be personalized by an individual customer and manufactured on demand: easily, with great quality, and at affordable prices. Whether its customized apparel, marketing materials for a business, or personalized photo products commemorating cherished family moments, we are making customized products accessible and affordable to everyone.

Events