Cyber Security News

What we’re talking about

ISO 27001 Prevents Cyberattacks
Cyber Security

ISO 27001 Prevents Cyberattacks – ISMS for Data Security

ISO 27001 Prevents Cyberattacks Implementing an ISO 27001 Information Security Management System (ISMS) prevents cyberattacks.  The Ponemon Institute in a 2017 study found that a typical firm experiences 130 security breaches each year.  Mitigating these breaches requires more than advanced IT practices, it requires a dedicated management system.  ISO/IEC 27001 is such a system.  It

Read More »
DoD Announces CMMC 2.0
Cyber Security

DoD Announces CMMC 2.0 to Ease Requirements

In an effort to ease requirements for the protection of Controlled Unclassified Information (CUI), the Department of Defense (DoD) has announced CMMC 2.0.  This new version of the Cybersecurity Maturity Model Certification (CMMC) program will pare down the scope and requirements placed on the Defense Industrial Base. Initial CMMC Cybersecurity Requirements Daunting CMMC was created

Read More »
spyware a growing concern for businesses
Cyber Security

Spyware a Growing Concern for Businesses

According to a number of leaders in cybersecurity, spyware is becoming an issue of growing concern for businesses.  Malwarebytes, in its 2021 report, Malwarebytes 2021 State of Malware Report, observed that business spyware detections increased 51% in 2020.  These spyware infections can be found on both computers and mobile devices. What is Spyware? Spyware is

Read More »
technical data and export law
Cyber Security

Technical Data and Export Law – Canada and the U.S.

Technical Data and Export Law Understanding what technical data is and how it pertains to export law is important for companies doing business in the U.S. and Canada.  Both countries have different requirements and regulations controlling how technical data is stored and transferred.  Additionally, these regulations are subject to change. What is Technical Data? Definitions

Read More »
CMMC Under Review
Cyber Security

CMMC Under Review Before Final Release

CMMC Under Review by DoD The DoD is finalizing changed to the Cybersecurity Maturity Model Certification program (CMMC) in an attempt to sufficiently address national security requirements without overburdening the defense industrial sector.  According to an article recently published at the Federal News Network, these changes are to be released soon as a finalized plan

Read More »
CMMC Still on Schedule
Cyber Security

CMMC Still on Schedule. Is Your Business?

CMMC Still on Schedule Despite Covid-19 Setbacks The Cybersecurity Maturity Model Certification (CMMC) is still on schedule according to articles posted by National Defense Magazine.  CMMC was developed by the Department of Defense and industry as an effective means of implementing a risk based management approach to cybersecurity.  The first draft (Version 1.0) was released

Read More »
Supermicro Hardware Hack
Cyber Security

SuperMicro Hardware Hack on Server Motherboards

Bloomberg reported on February 12, 2021 that a Supermicro hardware hack had been conducted on server motherboards by a Chinese espionage program.  This report follows previous reports by the news agency in 2018 and illustrates the susceptibility of technology manufacturers to supply chain attacks.  The hack involved embedding a small integrated circuit into the trace

Read More »
international trends in cybercrime
Cyber Security

International Trends in Cybercrime 2021

International trends in cybercrime show an increasing sophistication by both organized crime and hostile nation states.  These cybercriminals are continuing their efforts against high-value targets that include the industrial, IT, and infrastructure sectors.  This activity is occurring at a time when many organizations are struggling to develop integrated cybersecurity solutions. Cybercrime Exploitation of Uncertainty Cybercrime

Read More »
Karlton Johnson leads CMMC
Cyber Security

Karlton Johnson Chairs CMMC Accreditation Body

Karlton Johnson chairs CMMC-AB after serving as interim since September of 2020.  The accreditation body can now continue in its efforts to accredit sufficient assessors to certify the cybersecurity maturity of Department of Defense contractors.  The body had faced a challenges when on September 2, 2020 two members of the Cybersecurity Maturity Model Certification Accreditation

Read More »
Interim CMMC Version Released
Cyber Security

Interim CMMC Version Released After Leadership Change

An Interim CMMC version was released on September 29, 2020 finishing off a tumultuous month at the organization.  On September 2, 2020 two members of the Cybersecurity Maturity Model Certification Accreditation Board were voted off in the midst of a conflict of interest controversy involving a pay to play strategy.  Karlton Johnson is now the

Read More »
Employee Cybersecurity Negligence a Risk
Cyber Security

Employee Cybersecurity Negligence a Risk

Employee cybersecurity negligence is still a major cause of risk for businesses.  Despite an increased emphasis on training people, human error and bad habits continue to endanger sensitive information. Data Breaches on the Rise Institutions of all types have seen a dramatic increase in the number of cyber attacks.  This has been especially the case

Read More »
Ransomware Possible Cause of Death
Cyber Security

Ransomware Possible Cause of Death

Ransomware may have been the possible cause of death of a patient in Dusseldorf.  A ransomware attack on thirty servers at the Dusseldorf University hospital on September 9, 2020 prevented immediate emergency treatment and resulted in the patient having to be transported to a facility 20 miles away where she died from a delay of

Read More »
Video Conferencing Application Vulnerabilities
Cyber Security

Video Conferencing Application Vulnerabilities an Issue

Video conferencing application vulnerabilities have been frequently in the news during the Covid-19 pandemic.  During this time the use of these apps has skyrocketed due to remote work and schooling.  This has presented a tempting target for cyber criminals to steal information and disrupt activities. Zoom Bombing Incidents AL.COM reported that Saturday night Jewish prayer

Read More »
Denial of Service Attacks
Cyber Security

Denial of Service Attacks on the Increase

Denial of Service attacks (DoS) occurs when a targeted host or network is incapable of responding to legitimate users as a result of being flooded by traffic from the attacker.  Businesses worldwide have reported an increased number of these kinds of attacks.  Because these attacks result in inaccessibility of an organization’s resources and service, they

Read More »
IP Theft and National Security
Cyber Security

IP Theft and National Security Responses

IP Theft and National Security IP Theft and national security have been in the news a lot of late.  Most of this news has been centered around the activities of the Chinese military.  As a result commercial and defense technologies are at risk.  Fortunately, the United States has implemented a number of measures aimed protecting

Read More »
Military Cybersecurity Strategies
Cyber Security

Military Cybersecurity Strategies Applicable for Businesses

Military cybersecurity strategies have developed in the last decade.  General Paul Nakasone, Commander of United States Cyber Command and Director of the National Security Agency recently shared his perspectives on how to approach cyberspace in Foreign Affairs magazine. Employing Proactive Cybersecurity Approaches Cyber Command was established in 2010 to protect military operations networks from cyber

Read More »