Cybersecurity Compliance

Cybersecurity Compliance

Ten to fifteen years ago cybersecurity was considered secondary to other IT and computer science related interests like cloud computing, machine learning, big data, and data analysis. Sure, there were a plethora of anti-malware vendors, news reports on cybersecurity breaches, and a handful of cybersecurity programs and bootcamps; still, the focus was more on the software engineering side, and monetization of apps, with basic and essential security in place only. COVID served as a mediating impact where cyber-attack numbers skyrocketed, novel attack vectors were implemented, and new attack surfaces were exploited.

Despite the known vulnerabilities for SQL injection attacks, cross-scripting attacks on web browsers/online spreadsheets, and the need for zero-trust systems many businesses and medium sized corporations have not implemented known patches and security upgrades. With the lockdowns in effect more employees and students worked or studied remotely creating new pathways to malicious attackers: Phishing, smishing, ransomware, attacks on multifactor authentication (MFS), and social media hacking and impersonation from private accounts to work accounts.

CISA, NIST, HIPPA, and regulatory frameworks are often not followed because they are either not known to exist, or decision makers do not properly understand the requirements. While business owners and executives are not to blame for the common lack of knowledge/training there is a need for the managed security service provider (MSSP) to step in to assess the what, why, how, of a given businesses' IT network and digital ecosystem, analyze potential compliance/governance issues, and reveal underlying privacy and security needs.

My name is Jacob Mack and I help assess such needs with the guidance of our business owner Burton Maben with Creative Cyber Management (LLC).

With the MOVEit zero-day exploit wreaking havoc all over the US in the public and private sector we are only witnessing the beginning of the vulnerabilities and exploits that are yet to come.

Feel free to reach out for a 15-30 minute discovery call; while the call is free the potential losses in terms of capital and reputation with a serious data breach are often one businesses cannot afford.

要查看或添加评论,请登录

Dr. Jacob Mack PhD的更多文章

  • WACC and Financial Ratios Part I

    WACC and Financial Ratios Part I

    As promised here is the first part of a three part series in Financial Accounting. I will delve first into WACC in this…

  • Financial Ratios and WACC: Commonly Misapplied

    Financial Ratios and WACC: Commonly Misapplied

    Within MBA programs, board rooms, and financial news articles, we hear terms thrown around all the time like: Liquidity…

    2 条评论
  • Sampling size evaluation

    Sampling size evaluation

    The ability to accurately and effectively determine the sample size needed, the sampling method most appropriate, and…

  • Viral Self-Attenuation

    Viral Self-Attenuation

    Earlier on within the current COVID-19 (SARSCOV2), pandemic there were claims made by a minority of physicians saying…

  • Finance

    Finance

    Financial Ratios Financial Ratios: Detailed Applications and Analysis Jacob Mack Northcentral University FIN-7015 Dr…

社区洞察

其他会员也浏览了