Cyber Security -- Why Am I still At Risk - I Buy Every Product/Service

I am sure everyone is as confused as can be. How do you protect your computers and your network. It seems like you buy all the right products and services and still you are vulnerable to Cyber Attack. What to do?

1) Put in place appropriate Cyber Policy and Procedure -- its not just tools its Policy -- what you are supposed to do, its Tools -- what you are doing and its Follow-up -- what have you done. Do these things and follow standards such as NIST 800-53 and 800-171 and you will be much, much, much safer. If you need help there are plenty of places to find it -- or just ping me.

2) Keep your computer systems, storage devices and even IoT devices UP TO DATE -- get the latest fixes and patches -- I know I sound like a broken record but just do it !!! Automate it with DevOps -- if you need help -- this is a good area to get help in.

3) Encrypt everything and update/rotate/manage your keys. If it seems inevitable that you are going to get hacked then take the right precaution. Encrypt all your data a) at rest b) in motion. Use Self Encrypting Drives (SED) and if you want to be super secure use FIPS 140-2 accredited SED Drives. Seagate and other drive makers make these devices. Pair them with Key Managers such as Fornetix, Safenet/Gemalto, Utimaco or others.

If you take just these basic steps and get a little bit of help the world will be a much better place for computer and network operations. Considering the complexity of the world we live in - just think as simply as you can and do one thing at a time. Ultimately, you and your computers and networks will be much safer.

Dwain Moore

Training and Development/Higher Education/IT Professional

5 年

Thanks for sharing Greg. Hackers are getting smarter and more crafty at their game. It is so important that we stay "ready" as possible and do our part to protect our systems individually and at the enterprise level.

要查看或添加评论,请登录

Gregory Pepus的更多文章

  • Implications of Quantum

    Implications of Quantum

    By Greg Pepus It’s always fun to make a joke about quantum physics, but I wasn’t sure if I should …. So, I did and I…

    5 条评论
  • Data at Rest Made Easy

    Data at Rest Made Easy

    Securing Data at Rest (DAR) is a core issue for both US industry and government. What most people do not realize is…

  • SED/FIPS Drives - Hardware Encryption (PART 2)

    SED/FIPS Drives - Hardware Encryption (PART 2)

    Overview A couple of weeks ago, FUTURA Cyber published an article (Part 1 of this series) which introduced some details…

  • SED/FIPS Drives - Hardware Encryption

    SED/FIPS Drives - Hardware Encryption

    One of the best kept secrets in the storage world is the availability of self-encrypting storage devices (SATA, SAS…

    4 条评论
  • FUTURA Cyber Selected as a Finalist in US Air Force AFWERX Multi-Domain Operations 2019 Challenge

    FUTURA Cyber Selected as a Finalist in US Air Force AFWERX Multi-Domain Operations 2019 Challenge

    FUTURA Cyber to showcase intelligent cyber security solutions for the US Air Force, Joint Services, Allies and Partners…

    2 条评论

社区洞察

其他会员也浏览了