The Need for a Business Continuity Plan

The need for a Business Continuity Plan

Business Continuity Planning in a Coronavirus World

The need for a business continuity plan is becoming more critical as businesses adjust disruptions caused by the coronavirus.

A virus in and of itself can’t shut your company’s systems, operations, or services down, but it can impact how a business functions. It’s not often that businesses face a pandemic. Still, natural disasters, human-made disasters, security threats (such as a malware attack), and an outage are a reality. If businesses want to ensure a smooth recovery process and continuity of operations, they must do a risk assessment and develop a recovery services strategy with disaster recovery and business continuity plans.

Read More

The Need for vCISOs By SMBs

The Need for vCISOs By SMBs

Cybervisors to the rescue!

For many businesses today, the severe lack of a skilled Cybersecurity workforce is becoming clearly evident on a daily basis.  Just consider some of these statistics:

  • 45% of organizations report that they do not have an adequate IT security staff in order to ensure 24 × 7 × 365 monitoring;
  • 54% of business entities claim that they do not have an adequate Cybersecurity skill set for their size;
  • 57% of entities, even claim that they do not have enough Cybersecurity workers to fully man their Security Operations Centers (SOCs).

It should be noted that the Cybersecurity workforce shortage is a global trend that is occurring not just here in the United States, but on a global basis as well.  This is illustrated in the diagram below:

Read More

An Introduction to Penetration Testing – Part 1

An Introduction to Penetration Testing - Part 1

Understanding the fundamentals of penetration testing and how it applies to your business

In the world of Cyber Security today, there are obviously many technologies out there that one can use fortify the lines of defense for their business or corporation.  To a certain degree, depending upon how well these devices have been deployed and implemented, they should block any malicious traffic coming in into your IT Infrastructure (such as malformed Data Packets, assuming that a combination of Firewalls, Network Intrusion Devices, and Routers are being used).

Read More