Information Security Strategy Meets Tactical Execution.

Blog

Ingenuity - Where has it gone?

During a recent conversation at the gym with my buddy Peter Vinge owner of Torbay Consulting....the term "ingenuity" came up, and we concluded that it has primarily disappeared from modern business.  We have so many resources at our disposal today, AI, YouTube, GitHub, Reddit, etc. that we use to learn new things or how to fix whatever it is that we are working on.  While this may speed learning and execution, does it foster ingenuity and fresh thoughts?  Maybe, as long as we are using it in that context.

The adage "hold the course" has often been regarded as a beacon of stability and resilience in business. Yet, in today's dynamic business environments, clinging to the same old strategies can sometimes hinder growth and innovation.

It’s time to ask ourselves: where has ingenuity gone? Is the focus just on doing it like the content creators of today,  or is it focused on new, better ways of doing things?

 

The Risk of Complacency

While consistency and reliability are essential, they can lead to complacency. Businesses that stick rigidly to their traditional ways may fall behind more agile and innovative competitors. The market is constantly changing, and what worked yesterday might not be effective tomorrow.

Real-World Example: Consider the downfall of Blockbuster. By holding the course and failing to innovate in response to the rise of digital streaming, Blockbuster missed the opportunity to evolve and eventually succumbed to more forward-thinking competitors like Netflix.

 

Embracing Change

Ingenuity thrives in environments that welcome change and encourage creative thinking. Businesses should foster a culture that promotes experimentation and is open to new ideas. This doesn’t mean abandoning what works but instead being willing to adapt and improve.

Question: How does your organization encourage innovation and adaptability? What changes have you implemented recently to stay ahead of the curve?

 

The Power of Ingenuity

Ingenuity is more than just creativity; it’s about finding practical and often unexpected solutions to problems. It involves taking calculated risks and learning from both successes and failures. Companies prioritizing ingenuity are better equipped to navigate uncertainties and capitalize on new opportunities.

Personal Insight: In my experience, the most successful projects often stem from thinking outside the box and challenging the status quo. Fostering an environment where new ideas are valued and explored can drive meaningful change and growth.

Question: How are you encouraging ingenuity in your organization?  How does WFH or Hybrid work encourage or hinder ingenuity?

 

Pivoting with Purpose

Pivoting doesn’t mean abandoning your core values or mission. It means being flexible and responsive to the market’s demands. It’s about knowing when to stay the course and when to make strategic shifts. This balance is critical to sustaining long-term success.

Call to Action: You should reflect on your current strategies and consider areas where a pivot might be beneficial. Encourage your team to bring fresh ideas and be open to exploring new directions. Just because you talk about it in a meeting doesn't mean it will get implemented. Make meetings a safe space to discuss options and the "what-ifs" possible in your business.

 

Rekindling Ingenuity

To rekindle ingenuity in business, you must lead by example. Encourage curiosity, reward innovative thinking, and create a safe space for experimentation. Remember, some of the greatest advancements come from taking bold steps and embracing the unknown.  Consider the Wright Brothers’, they didn’t have much to go from, they coupled their study of aerodynamics with their engineering prowess to develop a biplane with wings that could be manipulated for balance and control.  While their work has led to an era where aviation has become integral to our daily lives, but we are not flying on the same plane that they developed in 1903.  Their work challenges the use of ingenuity to reach new heights.  Commercial airliners crisscross the globe, space exploration reaches new frontiers, and leading-edge technologies continue to redefine the possibilities of flight.

So, while holding the course can provide stability, balancing this with ingenuity and adaptability will accelerate your business. Businesses can thrive in today's dynamic landscape by fostering a culture of innovation and being willing to pivot when necessary.

 

Chris CathersComment
Octellient Navigator: Your Beacon in the Storm of Cybersecurity Threats

The recent report, "The Anatomy of Cybersecurity: A Dissection of 2023’s Attack Landscape," published by Armis, highlights a 104% increase in cybersecurity attack attempts in 2023 has put organizations on high alert. In this challenging landscape, Octellient's Navigator service emerges as a pivotal tool for businesses seeking to fortify their defenses through focused risk assessment, strategic guidance, and building resilience.

Pinpointing Risks with Precision:

  • Octellient’s Navigator service excels in conducting in-depth risk assessments tailored to the unique needs of each organization. Understanding that each business has its vulnerabilities, the Navigator service employs advanced methodologies to identify and evaluate risks stemming from both external threats and internal weaknesses, particularly in the context of increased cyberwarfare and legacy technology vulnerabilities.

Strategic Guidance and Prioritization:

  • With a landscape inundated with threats, including the alarming number of new CVEs, prioritization becomes crucial. Octellient’s Navigator service provides strategic guidance, helping businesses prioritize their response to threats based on their severity and potential impact. This approach ensures that resources are focused on areas where they are most needed.

Building a Culture of Cyber Resilience:

  • Beyond immediate risk mitigation, Octellient’s Navigator service emphasizes the development of a resilient organizational culture. This involves preparing businesses not just to defend against threats but also to recover and adapt swiftly in the event of a breach. Resilience planning includes developing robust response strategies and continuity plans that keep businesses operational even under threat.

Empowering Through Education and Awareness:

  • Recognizing that human factors are often the weakest link in cybersecurity, Octellient’s Navigator service includes comprehensive training and awareness programs. These initiatives are designed to equip employees with the knowledge and tools they need to identify and respond to potential cybersecurity threats effectively.

Ensuring Compliance and Adherence to Best Practices:

  • In a world where data protection regulations are stringent and ever-evolving, Octellient’s Navigator service ensures that businesses remain compliant with all relevant laws and standards. This compliance is not just about adhering to legal requirements but also about adopting best practices in data security and privacy.

The surge in cybersecurity threats demands a proactive and strategic response. Octellient's Navigator service offers SMB and SME businesses a comprehensive solution that not only assesses and mitigates risk but also fosters a resilient and educated organizational culture. With Navigator, businesses can navigate the stormy seas of cybersecurity with confidence and assurance.

Don’t let your business be caught off guard in the face of rising cyber threats. Reach out to Octellient today and discover how our Navigator service can transform your approach to cybersecurity, making your business safer, smarter, and more resilient.

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

info@octellient.com

www.octellient.com

Chris CathersComment
Octellient’s Cyber-Sleigh Adventures

In the magical town of Cyberhaven, where digital snowflakes gently fell from the virtual sky, the holiday season was approaching. Businesses were bustling with festive preparations, adorned with twinkling cyber-lights and the hum of excitement. However, in the ever-evolving security landscape, challenges lurked like mischievous Christmas elves. This is the tale of how Octellient, the navigator, guided organizations through the security wonderland.

 Chapter 1: A Digital Winter's Eve

In the enchanting town of Cyberhaven, the eve of the holiday season brought forth a flurry of activity. Businesses adorned their virtual storefronts with twinkling lights and festive graphics, creating a delightful atmosphere. Yet, beneath the surface, the digital realm was teeming with potential threats. Recognizing the need for a digital guide, organizations turned to Octellient, the wise cyber navigator. As the first snowflakes gently settled, Octellient began crafting personalized plans to navigate the upcoming security wonderland, ensuring that each organization could celebrate the holidays without a hint of cyber worry.

 Chapter 2: Octellient's Watchful Vigilance

With watchful eyes scanning the vast digital landscape, Octellient stood as a cyber navigator ready to guide organizations through the challenges ahead. Recognizing the unique nuances of each entity's cybersecurity needs, Octellient tailored its guidance to ensure a safe journey. Much like a digital Sherpa leading organizations through a treacherous mountain pass, Octellient's vigilance became the beacon illuminating the path through the security wonderland.

 Chapter 3: The Enchanted Forest of Phishing Threats

As organizations ventured into the enchanted forest of phishing threats, Octellient's guidance became paramount. Crafty cyber-impersonators disguised themselves as holiday well-wishers, attempting to infiltrate networks with deceptive emails. Octellient armed organizations with the knowledge needed to identify and thwart these digital tricksters, turning the once treacherous forest into a whimsical haven where cyber threats were easily vanquished.

 Chapter 4: Fortifying the Cyber Castle

 In the heart of Cyberhaven, Octellient led organizations to fortify their cyber castles against potential breaches. Together, they strengthened virtual walls with robust firewalls, updated security protocols, and reinforced access points. The digital moat surrounding sensitive data became impervious, protecting it like treasures within a medieval stronghold. Octellient's role as a cyber navigator ensured that the organizations' digital fortresses stood resilient against the evolving challenges of the security wonderland.

 Chapter 5: A Sleigh Ride Through Secure Networks

Emboldened by Octellient's guidance, organizations embarked on a sleigh ride through secure networks. The digital landscape transformed into a winter wonderland of encrypted data, ensuring a safe journey through the realms of cyberspace. Octellient's watchful gaze remained steadfast, navigating the organizations through the security wonderland with expertise and care. The festive sleigh ride became a joyous and secure adventure, with Octellient as the trusted cyber navigator ensuring a merry Christmas for all in Cyberhaven.

 Epilogue: A Merry and Secure Christmas in Cyberhaven

As the clock struck midnight on Christmas Eve in Cyberhaven, the once bustling town now rested in the gentle glow of a secure and merry celebration. Octellient's watchful guidance had not only safeguarded organizations but had also fostered a resilient and united community in the face of evolving cyber challenges.

The festive lights in Cyberhaven twinkled not just with holiday cheer but with the assurance of a digital landscape fortified against potential threats. Octellient, the cyber navigator, continued to stand guard, ensuring that the holiday spirit prevailed without any interference from the lurking cyber grinches.

The residents of Cyberhaven, businesses, and institutions alike, rejoiced in the knowledge that their digital journey through the security wonderland had been guided by the wisdom of Octellient. The town celebrated a Christmas filled with joy, peace, and the secure embrace of a cyber-savvy community.

As the first rays of Christmas morning dawned, Cyberhaven knew that, with Octellient as their trusted cyber navigator, future holidays would be just as merry and secure. The tale of a cyber-sleigh adventure became a cherished memory, and the residents of Cyberhaven looked forward to celebrating without a worry in their digital wonderland throughout the entire year.

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

info@octellient.com

www.octellient.com

Chris CathersComment
Demystifying Data Ownership in AI: Bridging the Gap Between Innovation and Responsibility

Artificial Intelligence (AI) stands as a revolutionary force, transforming business operations and data interactions.  It also ushers in unique challenges concerning data ownership and risks tied to AI applications.  Are these challenges truly unique and different than what we have been doing? 

Just as we define ownership and usage rights for tangible assets, AI demands clear delineation of data ownership and consent mechanisms.  Just like the need for data governance policies defining how an organization uses and manages its data in other systems, data governance and privacy are pivotal in the AI realm. Implementing robust cybersecurity measures for safeguarding data is a standard practice no matter the asset.

Collaborative agreements to determine data ownership and usage rights need to align with common business practices involving partnerships and stakeholder agreements. Regular audits to ensure fairness and accuracy should be completed just like quality checks and audits prevalent in any industry.

Lastly, educating stakeholders about AI and associated risks mirrors the essential practice of educating individuals about the importance of protecting valuable assets and sensitive information in any organizational setting. By drawing these parallels, it becomes evident that the principles of responsible data handling and ownership in the AI landscape resonate with the standard security and management practices across diverse domains.

To achieve effective management of data ownership and mitigate risks in the AI landscape, organizations can take the following three steps:

Establish Clear Data Governance Policies:

Create comprehensive data governance policies that outline how data is collected, stored, processed, and shared within the organization. These policies should clearly define data ownership, access rights, usage restrictions, and consent mechanisms. Ensure that all stakeholders, including employees, vendors, and partners, are educated and aware of these policies. Establish a framework for enforcing these policies and regularly review and update them to adapt to evolving regulations and technologies.

Implement Robust Cybersecurity Measures:

Prioritize cybersecurity to safeguard AI infrastructure, models, training data, and sensitive information. Implement best practices for secure coding, encryption techniques, access controls, and regular security audits. Train employees on cybersecurity awareness and conduct drills to simulate potential cyber threats and responses. Collaborate with cybersecurity experts and stay informed about the latest threats and defense strategies to continuously enhance your organization's security posture.

Foster a Culture of Transparency and Accountability:

Promote a culture of transparency regarding data usage and AI operations within the organization. Encourage open communication among teams working on AI projects and ensure that data ownership and usage rights are clearly communicated and understood. Hold individuals and teams accountable for adhering to data governance policies and cybersecurity measures. Establish channels for reporting any breaches, anomalies, or potential risks promptly, and instill a sense of responsibility among all employees to prioritize data security and responsible AI practices.

By focusing on clear data governance, robust cybersecurity measures, and fostering a culture of transparency and accountability, organizations can effectively manage data ownership and mitigate risks associated with AI, ensuring responsible and secure utilization of AI technologies, just as you should be doing with any of your other data and information assets.  So as you see, this isn’t really that unique of a situation, but it is one that you need to get our arms around rather quickly and set the parameters that are right for your data and for your company. 

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

info@octellient.com

www.octellient.com

Chris Cathers Comment
Small Business, Big Threat: Defending Against Modern Cybersecurity Menaces

Small and midsize companies are no longer exempt from the perils of cyber threats. In fact, they are increasingly becoming prime targets for malicious actors seeking vulnerabilities in less fortified digital landscapes. Let’s dive into the latest security threats that small and midsize companies face and explore the best strategies to address them effectively.

The Ever-Evolving Threat Landscape

 Small and midsize companies may not make headlines as often as large corporations when it comes to cybersecurity breaches, but they are far from immune to cyber threats. In fact, these businesses often lack the robust security measures and dedicated IT teams that larger enterprises have, making them attractive targets for cybercriminals. Here are some of the latest security threats they face:

  • Ransomware Attacks: Ransomware has emerged as a pervasive and devastating threat. Cybercriminals encrypt a company's data and demand a ransom for its release, crippling operations and potentially causing data loss.

  • Phishing Scams: Phishing attacks have become increasingly sophisticated. Attackers use deceptive emails, messages, or websites to trick employees into revealing sensitive information or installing malware.

  • Supply Chain Attacks: Small and midsize companies often rely on third-party vendors and suppliers. Cybercriminals exploit this by targeting vulnerabilities in the supply chain, infecting systems with malware, or stealing sensitive information.

  • Credential Theft: Breached or weak passwords can lead to unauthorized access to company accounts and data. Credential theft remains a common entry point for attackers.

  • Employee Negligence: Insider threats, whether intentional or unintentional, continue to pose risks. Employees may inadvertently expose the company to vulnerabilities through careless actions or mistakes.

Addressing the Threats

 Now that we've identified the threats, let's explore how small and midsize companies can effectively address them.  Focus on keeping them simple, ensuring consistency.  Consistency is the key to ensuring effectiveness.

  • Employee Training and Awareness: Start by educating your workforce about cybersecurity best practices. Regular training sessions can help employees recognize phishing attempts and understand their role in maintaining security.

  • Robust Password Policies: Implement strong password policies, encourage the use of password managers, and consider multifactor authentication (MFA) to protect accounts from credential theft.

  • Regular Updates and Patch Management: Keep all software, systems, and devices up-to-date with the latest security patches. Many cyberattacks exploit known vulnerabilities that could have been prevented with timely updates.

  • Network Security: Invest in a firewall, detection capabilities, and endpoint detection and response. Regularly monitor network traffic for suspicious activities and establish strong access controls. This can be done internally or through a third-party service.

  • Data Backup and Recovery: Regularly back up critical data and systems and ensure immutability. Beyond backup, know where, in what priority, and how you are going to restore the systems that the data runs on.  This ensures that, in case of a ransomware attack, you can restore your operations without paying the ransom.

  • Incident Response Plan: Develop a clear incident response plan that outlines how to react in the event of a security breach. This plan should include communication protocols, containment strategies, and legal considerations.

  • Third-Party Risk Management: Assess the security practices of your vendors and suppliers. Make sure they adhere to high-security standards and have their own cybersecurity measures in place.

  • Security Audits and Assessments: Regularly conduct security assessments and audits to identify vulnerabilities and weaknesses in your digital infrastructure.

  • Seek Professional Guidance: Consider partnering with Octellient, our methodology “right sizes” security.  We provide expertise and solutions tailored to your needs.

While small and midsize companies may lack the vast resources of their larger counterparts, they can still build strong defenses against evolving cyber threats. By prioritizing cybersecurity awareness, implementing robust security measures, and staying proactive, these businesses can navigate the digital jungle with confidence and protect their invaluable digital assets from malicious actors. Remember, cybersecurity is not a one-time effort but an ongoing commitment to safeguarding your organization's future.  Keep it Simple and Consistent.

info@octellient.com

www.octellient.com

Chris CathersComment
Harnessing the Power of Cross-Functional Collaboration: Strategies for Building Stronger Teams and Achieving Business Excellence

The success of an organization hinges not just on the individual efforts of its departments, but on their ability to collaborate seamlessly. Cross-functional collaboration has emerged as a key driver of innovation, productivity, and overall business excellence. Think about your organization, your teams, how can you you utilize this strategy to improve information security and resiliency in your organization as well as harness its power across all of your departments to strengthen and grow.

The Benefits of Cross-Functional Collaboration

Innovation Acceleration: When individuals from different departments come together, they bring diverse perspectives and expertise. This diversity sparks creativity and results in the generation of innovative ideas that might not have emerged within siloed teams.

Enhanced Problem Solving: Complex challenges often require a multidisciplinary approach. By working collaboratively, teams can leverage the collective knowledge and skills of their members to arrive at more comprehensive and effective solutions.

Improved Decision-Making: Cross-functional teams can make well-informed decisions by considering a wide range of viewpoints. This minimizes blind spots and leads to more strategic choices that align with the organization's goals.

Efficiency and Resource Optimization: Collaboration fosters better resource utilization, as teams can share information, tools, and technologies, avoiding duplication of efforts and reducing waste.

Not just for the enterprise

You are saying to yourself, this approach will only work in an enterprise organization. The reality is that it has profound importance in small and mid-size organizations. Here’s why:

Agility and Adaptability: In SMBs, resources are often limited. Collaboration allows these businesses to adapt swiftly, leveraging the combined expertise of their teams to navigate challenges with finesse.

Nurturing Talent: Cross-functional collaboration provides an environment where employees can wear multiple hats, fostering growth and skill development. For SMBs, this can be a powerful tool in nurturing a versatile workforce.

Holistic Decision-Making: SMBs can benefit immensely from the inclusive nature of cross-functional collaboration. This approach ensures that important decisions are considered from various angles, leading to well-rounded choices.

Strategies for Fostering Cross-Functional Collaboration

Clear Communication Channels: Establish open lines of communication between departments, ensuring that information flows freely. Regular team meetings, project updates, and cross-departmental workshops can facilitate this exchange.

Shared Goals and Metrics: Align departments around common objectives and key performance indicators (KPIs). This ensures that everyone is working towards a unified purpose, fostering collaboration instead of competition.

Cross-Functional Teams: Create temporary teams composed of members from different departments to work on specific projects. This promotes the exchange of skills, knowledge, and perspectives.

Leadership Support: Leadership plays a pivotal role in encouraging and modeling cross-functional collaboration. When leaders collaborate across departments, it sets a powerful example for the entire organization.

Technology and Tools: Invest in collaborative software and platforms that facilitate communication, document sharing, and project tracking. These tools can bridge geographical gaps and enhance remote collaboration.

Cross-functional collaboration isn't just a buzzword; it's a proven strategy for organizations aiming to achieve business excellence. By breaking down silos, embracing diversity, and fostering a culture of collaboration, companies can tap into the collective intelligence of their teams and drive innovation, efficiency, and success. This strategy can be deployed in almost every aspect of your business. From our perspective, this strategy is of utmost importance in information security. As you embark on your journey to harness the power of cross-functional collaboration, remember that the rewards are not just evident in your bottom line but also in the growth and development of your employees and the overall health of your organization.

Chris CathersComment
We Must Do Better: Empowering Company Leadership with Cybersecurity for SMBs and SMEs

Cybersecurity has emerged as a critical factor that can make or break businesses. Surprisingly, a recent study reveals that over 50% of IT security decision makers in small and medium-sized businesses (SMBs and SMEs) fail to prioritize cybersecurity, considering it only a box-ticking exercise for compliance. However, it's time to recognize that cybersecurity is not just about meeting regulations—it is a key differentiator that ensures a resilient and secure business environment. This article aims to shed light on the importance of cybersecurity and highlight how aligning it with business goals can unlock a world of opportunities for SMBs and SMEs.

 

The Misalignment and Negative Consequences:

A survey conducted by Delinea, a privileged access management provider, found that 61% of security decision makers in SMBs and SMEs believe that their company's leadership overlooks the significance of cybersecurity in driving business success. Only 39% feel that their board of directors and C-suite truly grasp the role of cybersecurity as a business enabler. This misalignment between cybersecurity and the wider business goals carries severe consequences.

The survey findings underscore the negative impact of this misalignment. An alarming 89% of respondents reported experiencing adverse consequences resulting from the disconnect between cybersecurity and business objectives. Shockingly, more than 26% confessed to an increased number of successful cyberattacks within their organizations. Moreover, misaligned goals contributed to delays in investments (35%), hindered strategic decision-making (34%), and led to unnecessary spending (27%). The disconnect even created stress for 31% of the security teams. Against the backdrop of global economic uncertainty, 48% of respondents highlighted the growing difficulty of aligning cybersecurity with broader business goals.

 

Shifting Mindsets and Emphasizing Business Value:

Executives must view cybersecurity not merely as a compliance requirement or protective measure, but as a value-driven strategy. To achieve better alignment, cybersecurity leaders must develop their business skillsets. While technical expertise is crucial, the survey respondents identified skills such as communication, collaboration, business acumen, and people management as equally important.

 

Making the Business Case and Enhancing Communication:

The survey revealed that nearly one-third of respondents felt a gap in their own skillset when it comes to making a compelling business case for cybersecurity to the board and C-suite. This highlights the importance of effective communication, clearly articulating the business value of cybersecurity initiatives. SMB and SME leaders must effectively convey how cybersecurity aligns with overall goals and objectives, demonstrating its tangible impact on the organization's success.

 

Empowering Leadership and Reporting Structure:

Interestingly, 27% of IT security decision makers believe that the most senior cybersecurity leaders, such as the Chief Information Security Officer (CISO), should report directly to the CEO. This reporting structure ensures the best alignment of cybersecurity with the overall goals of the business, influencing decision-making processes and strategies. It emphasizes the need for cybersecurity to have a prominent seat at the table, enabling effective alignment and collaboration.

 

The Essential Alignment of Cybersecurity and Business Goals:

Aligning cybersecurity with business goals is essential for success. The survey clearly highlights the negative consequences that arise when objectives are not in sync. It is vital to foster common agreement across business functions and establish meaningful metrics that not only measure security activity but also demonstrate its impact on business outcomes.

 

As SMB and SME leaders, it is time to recognize the immense potential of cybersecurity as a powerful differentiator. By prioritizing cybersecurity and aligning it with broader business goals, we can create a resilient and secure business environment that sets us apart.

 

How we help

To help SMBs and SMEs overcome the challenges highlighted in the survey, Octellient’s Propulsion offers the expertise of a virtual Chief Information Security Officer (vCISO). Our vCISO serves as your strategic partner, bridging the gap between cybersecurity and business objectives. With our in-depth knowledge of information/cyber security and business acumen, we can help align cybersecurity initiatives with the broader goals of the organization. We possess the technical expertise necessary to implement robust security measures while also focusing on effective communication, collaboration, and people management skills. By engaging Octellient, SMBs and SMEs can leverage our expertise to develop a compelling business case for cybersecurity, enhance communication with key stakeholders, empower leadership, and establish the essential alignment between cyber security and business goals. This partnership unlocks the power of security, ensuring a resilient and secure business environment that drives success and sets you organization apart from the competition.

 

info@octellient.com

www.octellient.com

Chris CathersComment
Unlocking Security for SMBs: The Value of a Virtual Chief Information Secuirty Officer (vCISO)

Small and mid-size businesses (SMBs) face unique challenges when it comes to implementing effective security measures. They face the same threats as the large corporations, yet lack  budget and often times understanding.  The cost of building an in-house security team and acquiring the necessary expertise can be prohibitive. However, SMBs need not compromise on security. By leveraging the services of a virtual Chief Information Security Officer (vCISO), they can access expert guidance and ensure robust protection without the hefty price tag.

 

1.     Expert Guidance at a Fraction of the Cost:

A vCISO brings years of experience and expertise in cybersecurity, risk management, and compliance. By engaging a vCISO, SMBs gain access to top-tier talent without the burden of hiring a full-time executive. The vCISO can assess the organization's security posture, develop a comprehensive security strategy, and provide ongoing guidance, all within a budget-friendly framework.

 

2.     Tailored Security Solutions:

Every SMB has unique security requirements based on its industry, size, and operations. A vCISO takes the time to understand these specific needs and develops customized security solutions. They collaborate closely with SMB stakeholders, aligning security goals with business objectives. This tailored approach ensures that security investments are well-placed and aligned with the organization's risk appetite and strategic initiatives.

 

3.     Strategic Planning and Risk Management:

A vCISO helps SMBs establish a clear security roadmap by conducting thorough risk assessments and vulnerability analyses. They identify potential threats and develop proactive strategies to mitigate risks. From incident response planning to business continuity management, the vCISO ensures that SMBs are prepared to navigate security challenges and respond effectively when incidents occur.

 

4.     Cost Optimization and Resource Allocation:

The vCISO assists SMBs in optimizing security costs and resource allocation, often times focusing on people and process first.  Should a tool be required, they have a deep understanding of the security market and can recommend cost-effective technologies and solutions tailored to the organization's needs. By leveraging their network of industry contacts, vCISOs can negotiate favorable pricing for security tools and services, helping SMBs achieve the most value for their investment.

 

5.     Compliance and Regulatory Support:

SMBs often struggle with meeting industry-specific compliance requirements and navigating regulatory landscapes. A vCISO stays up to date with evolving regulations and can provide guidance on compliance frameworks such as GDPR, HIPAA, or PCI-DSS. They help SMBs develop and maintain policies and procedures that meet these standards, reducing the risk of penalties and reputational damage.

 

6.     Employee Education and Training:

Security awareness among employees is critical to mitigating risks. A vCISO designs and delivers tailored training programs that educate employees about potential threats, best practices for data protection, and incident reporting protocols. This includes general security awareness training as well as anti-phishing training.  By fostering a security-conscious culture, employees become the organization's first line of defense against cyber threats.

 

The cost of hiring a full-time Chief Information Security Officer (CISO) can be prohibitive for SMBs. However, through a vCISO service like Octellient’s Propulsion, SMBs can access expert guidance, strategic planning, and tailored security solutions at a fraction of the cost. A vCISO helps SMBs optimize their security investments, navigate regulatory requirements, and foster a culture of security awareness. By unlocking the value of a vCISO, SMBs can strengthen their security posture, protect their assets, and confidently navigate the evolving threat landscape. Remember, securing your business is an investment in its long-term success and resilience.

 

 

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

  

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
The Hidden Toll: Addressing Burnout and Mental Health in Information Security

Mental health is critical for all of us today. This is especially true in the information security field. The high-stress nature of the work, coupled with the constant threat of cyber attacks and data breaches, can take a significant toll on individuals working in this field. As a result, burnout and mental health issues are becoming increasingly common among information security professionals.

May is Mental Health Awareness Month so let’s explore ways that we can all prioritize mental health.  Here are some things that we can all be aware of, prepare for, and work on to improve our mental health:

Take care of physical health: Taking care of physical health, through exercise and healthy eating, can have a positive impact on mental health. This can help improve energy levels and reduce stress and anxiety.

Take breaks: Regularly taking breaks throughout the day can help reduce stress and improve focus. This may include taking a walk, stretching, or simply stepping away from the computer screen for a few minutes.

Practice mindfulness: Practicing mindfulness, such as meditation or deep breathing, can help manage stress and anxiety related to work. This can be particularly helpful during high-pressure situations.

Connect with colleagues: Building relationships with colleagues can provide a sense of community and support. This can include engaging in team-building activities or simply chatting with coworkers during breaks.

Set realistic expectations: Setting realistic expectations for yourself can help prevent feelings of overwhelm and burnout. This may include prioritizing tasks and delegating responsibilities when necessary.

Mental health in the information security field is an essential issue that needs to be addressed. The stress and pressure of the job, coupled with the constant threat of cyber attacks and data breaches, can lead to burnout and other mental health issues. It's vital for individuals and organizations in the field to recognize and prioritize mental health to create a healthy and sustainable work environment. By taking proactive steps to support mental health, individuals in information security can improve their overall well-being and better handle the demands of their work. Let's work together to ensure that mental health remains a top priority in the information security field and beyond. 

 

 OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

  

Ask us about Propulsion and Deepwater services

info@octellient.com

www.octellient.com

Why a Comprehensive Information Security Approach is Essential

Today, organizations of all sizes and industries face an ever-growing number of cyber threats. Cybersecurity has become an essential component of information security, but it's important to recognize that information security encompasses more than just digital threats. Organizations must take a comprehensive approach to protect their sensitive information and digital assets, which includes focusing on information security as a broader concept.

Information security refers to the protection of information, whether it's in physical or digital form, from unauthorized access, use, disclosure, disruption, modification, or destruction. It includes all sensitive or confidential data that an organization might possess, such as personal identification information, financial data, intellectual property, trade secrets, and other proprietary information.

Cybersecurity, on the other hand, focuses on protecting digital systems, networks, and assets from cyber threats. These threats can include malware, viruses, phishing attacks, hacking attempts, and other malicious activities that can lead to data breaches, loss of data, or disruption of services.

While cybersecurity is a critical component of information security, taking a broader approach to information security offers several benefits to organizations.

1.     Comprehensive Protection: Focusing on information security as a broader concept ensures that an organization is protected from a wide range of threats, both digital and physical. It helps to ensure that sensitive data is protected throughout its lifecycle, from creation to disposal.

2.     Compliance: Many industries have specific regulations and standards for protecting sensitive data, such as HIPAA for healthcare organizations and PCI-DSS for payment card industry organizations. Taking a comprehensive approach to information security ensures that an organization is compliant with these regulations and standards.

3.     Risk Management: A comprehensive information security approach helps organizations identify and manage risks to their sensitive data and digital assets. This includes identifying potential threats, assessing the likelihood and impact of those threats, and implementing appropriate controls to mitigate those risks.

4.     Business Continuity: Protecting sensitive data and digital assets is critical to an organization's operations and reputation. A comprehensive information security approach helps ensure that an organization can continue to operate in the event of a data breach or cyber attack.

5.     Improved Trust: Taking a comprehensive approach to information security helps build trust with customers, partners, and stakeholders. It demonstrates that an organization takes data protection seriously and is committed to protecting sensitive information and digital assets.

Taking a comprehensive approach to information security means considering all aspects of an organization's data and assets, from physical security measures to digital security controls, and from data management policies to employee training programs.

One critical aspect of a comprehensive information security approach is to conduct a risk assessment to identify potential vulnerabilities and threats. This process involves assessing the likelihood and potential impact of a security breach or cyber attack, and then determining the appropriate measures to mitigate those risks.

This may include implementing access controls, such as requiring strong passwords or two-factor authentication, encrypting sensitive data, regularly backing up data, and establishing incident response plans to quickly respond to any security breaches or cyber attacks.

Additionally, comprehensive information security programs should include policies and procedures related to data management. This includes data classification, data retention, and data destruction policies to ensure that sensitive and confidential data is handled appropriately throughout its lifecycle.

Employee training and awareness programs are also a critical component of a comprehensive information security approach. Many security breaches occur as a result of employee errors, such as falling for phishing scams or using weak passwords. Therefore, educating employees on best practices for data security and providing ongoing training and awareness programs can help mitigate the risk of human error.

By taking a comprehensive approach to information security, organizations can achieve many benefits beyond just protecting against cyber threats. Compliance with industry regulations and standards is essential, and a comprehensive approach helps ensure that all data is handled appropriately to maintain compliance.

Business continuity is also a critical benefit of a comprehensive information security approach. By protecting against data breaches and cyber attacks, organizations can ensure that they can continue to operate in the event of an attack or other security incident.

Finally, by taking a comprehensive approach to information security, organizations can improve trust with stakeholders. Customers, partners, and other stakeholders expect that their sensitive data is handled appropriately and protected from unauthorized access. A comprehensive approach to information security can help organizations demonstrate their commitment to protecting sensitive data and digital assets, which can improve trust and enhance their reputation.

In conclusion, while cybersecurity is an essential component of information security, organizations must take a broader approach to protect their sensitive data and digital assets. A comprehensive information security program includes assessing risks, implementing controls and policies, providing employee training, and establishing incident response plans. By taking a comprehensive approach, organizations can achieve comprehensive protection, compliance, risk management, business continuity, and improved trust with stakeholders. 

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
Comparing the Freedom of Cross-Country Motorcycle Trips to the Discipline of Information Security

As a cross-country motorcycle rider, I got thinking about how my experience on the open road could be applicable to information security.  There are so many aspects of life that can be compared to preparing for and traveling cross country on a motorcycle.  Here we will explore a few as they compare to information security.

Planning and Preparation

Before embarking on a cross-country motorcycle trip or implementing an information security plan, it is essential to do your research and make a plan. For the motorcycle trip, this might include deciding on your route, checking weather conditions, and ensuring that your bike is in good working condition. For information security, this might include performing a risk assessment, identifying potential threats, and implementing security controls.

In both cases, a well-planned and well-prepared approach can help you to avoid potential problems and ensure that you have the tools you need to handle any issues that arise. However, it is important to note that even the best-laid plans can go awry, so it is important to remain flexible and adaptable and have a plan for that too.

Risk Assessment

One of the most important aspects of both a cross-country motorcycle trip and information security is identifying potential risks. For the motorcycle trip, this might include hazards on the road, adverse weather conditions, or mechanical failures. For information security, this might include cyberattacks, data breaches,  insider threats or weather events..

In both cases, it is important to take a proactive approach to risk assessment, identifying potential threats and taking steps to mitigate them. This might involve taking precautions such as wearing protective gear on a motorcycle trip or implementing security measures such as firewalls and detection systems in an information security plan.

Adaptability

Adaptability is a crucial skill in both cross-country motorcycling and information security. In cross-country motorcycling, riders must be prepared to face unexpected road conditions, weather changes, and other challenges that may arise during a long trip. They need to be adaptable to these changes to ensure their safety and the success of their trip.

Similarly, in information security, threats and risks can arise unexpectedly, and it is essential to be adaptable and able to respond quickly to new situations. Security protocols and software must be updated regularly, and employees must be trained to handle any potential risks. Adapting to new situations and responding quickly can help prevent data breaches and ensure the security of sensitive information.

In both cross-country motorcycling and information security, being adaptable means being prepared to face the unexpected. It involves being able to adjust plans quickly and make decisions on the fly to ensure success and safety. Being adaptable also requires a certain level of flexibility and creativity, as different situations may require different solutions.

Attention to Detail

Attention to detail is an essential skill in both cross-country motorcycling and information security. In cross-country motorcycling, riders must pay close attention to the condition of their motorcycle, the weather conditions, and the route they are taking. Every detail can impact their safety and the success of their trip 

Similarly, in information security, attention to detail is essential to ensure the security of sensitive information. Every detail, such as proper software updates, secure passwords, and proper training for employees, can make a significant difference in preventing data breaches and protecting sensitive information.

In both cross-country motorcycling and information security, even the smallest detail can have a significant impact. In motorcycling, failing to notice a loose bolt or worn-out tire can cause an accident, while in information security, a weak password or outdated software can result in a data breach. Paying attention to detail is critical to identifying potential risks and vulnerabilities and taking action to prevent them.

Conclusion

In conclusion, the skills and expertise gained from cross-country motorcycling can be applied to information security. Both require careful planning and preparation, constant assessment of risk, the ability to adapt to changing conditions and threats and attention to detail to ensure success and safety. By recognizing the similarities between these seemingly different activities, individuals can apply these skills to protect sensitive information and prevent data breaches. Being proactive in identifying potential risks and taking steps to mitigate them is crucial, as is the ability to respond quickly and creatively to unexpected situations. Overall, these skills and experiences demonstrate the importance of taking a comprehensive and holistic approach to protecting important data and information.

 

 

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
Securing Your Business: Navigating the Complex World of Cybersecurity with Propulsion vCISO

Today, cybersecurity is a constant concern for businesses of all sizes, and mid-market organizations are no exception. While large enterprises have more resources to invest in security measures, mid-market companies often have limited budgets and may lack the same level of expertise to manage security risks. In this blog, we'll discuss the top five security threats that mid-market organizations face and how partnering with Octellient and our Propulsion vCISO service can help address these threats.

1.     Phishing attacks: Phishing attacks are one of the most common and dangerous security threats that mid-market organizations face. These attacks typically involve sending fraudulent emails that appear to be from reputable sources, such as banks or other financial institutions, in an attempt to trick users into revealing sensitive information like login credentials. Propulsion can help mid-market organizations develop effective phishing awareness training programs for their employees. This training can help employees recognize and avoid phishing emails, reducing the risk of successful attacks.

2.     Ransomware attacks: Ransomware attacks have become increasingly common in recent years, and mid-market organizations are particularly vulnerable. These attacks involve infecting a system with malware that encrypts the victim's data, making it inaccessible until a ransom is paid. Ransomware can be devastating for mid-market organizations, as they may not have the resources to recover from a successful attack. Propulsion can help mid-market organizations implement effective security controls, such as firewalls, antivirus software, and intrusion detection systems, to prevent ransomware attacks. Additionally, Propulsion vCISO can develop incident response plans to minimize the impact of a successful attack.

3.     Insider threats: Insider threats are another significant security risk for mid-market organizations. These threats come from employees or contractors who intentionally or unintentionally cause harm to the organization. Insider threats can take many forms, including stealing sensitive data, intentionally damaging systems, or accidentally exposing confidential information. Propulsion can help mid-market organizations develop and implement access controls, employee monitoring programs, and employee training programs to prevent insider threats.

4.     IoT devices: The proliferation of IoT (Internet of Things) devices has created new security challenges for mid-market organizations. These devices, which can include anything from smart thermostats to security cameras, are connected to the internet and can be vulnerable to hacking. IoT devices can be used as entry points for attackers, allowing them to gain access to an organization's network. Propulsion can help mid-market organizations develop and implement effective IoT device security policies, including strong passwords, regular firmware updates, and vulnerability assessments.

5.     Third-party vendors: Mid-market organizations often rely on third-party vendors for various services, including IT support, marketing, and accounting. However, these vendors can pose a significant security risk if they do not have adequate security measures in place. Attackers may target these vendors to gain access to a mid-market organization's systems or data. Propulsion can help mid-market organizations assess the security policies and practices of third-party vendors and ensure that they meet the organization's security standards.

In conclusion, mid-market organizations face a variety of security threats that require proactive measures to mitigate. By partnering with Octellient's Propulsion vCISO service, mid-market organizations can access expert security consultants who can help them develop and implement effective security programs to address these threats. Propulsion vCISO can help mid-market organizations reduce their risk of security breaches, protect their sensitive data, and ensure the continued success of their businesses.

 

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions,  and bring expert advice to your toughest challenges.

 

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
Building Resilience: Essential Components of a Business Continuity and Disaster Recovery Strategy

Business Continuity and Disaster Recovery (BCDR) is an essential aspect of any organization's operations. It is a set of processes, procedures, and policies that help businesses prepare for, respond to, and recover from unexpected events that may disrupt their operations. These events can range from natural disasters like earthquakes and floods to human-made disasters like cyber attacks or pandemics. A robust BCDR strategy can help businesses minimize the impact of such events and ensure continuity of operations. In this blog, we will discuss the essential components that a BCDR strategy should include.

1.     Business Impact Analysis (BIA): The first step in developing a BCDR strategy is to conduct a Business Impact Analysis (BIA). BIA helps businesses identify critical business processes and assets that are essential for their operations. It also helps identify the impact of a disruption to these processes and assets, such as financial losses, reputational damage, or regulatory penalties.

2.     Risk Assessment: After completing the BIA, businesses need to conduct a risk assessment. This involves identifying potential threats that can disrupt their operations, such as natural disasters, cyber attacks, power outages, or supply chain disruptions. It also involves assessing the likelihood and impact of these threats and prioritizing them based on their severity.

3.     Business Continuity Plan (BCP): A Business Continuity Plan (BCP) outlines the procedures and processes that businesses need to follow to ensure continuity of operations during a disruption. A BCP includes measures such as backup and recovery procedures, alternate work locations, communication protocols, and crisis management procedures.

4.     Disaster Recovery Plan (DRP): A Disaster Recovery Plan (DRP) is a subset of the BCP that focuses on IT systems and data recovery. It outlines the procedures and processes that businesses need to follow to restore their IT systems and data in the event of a disruption. This includes backup and recovery procedures, alternate data storage locations, and testing procedures to ensure the effectiveness of the plan.

5.     Testing and Training: Once a BCDR strategy is developed, businesses need to test and train their staff regularly. Testing involves running simulations of potential disruptions to identify gaps in the plan and improve its effectiveness. Training involves ensuring that all staff members are aware of their roles and responsibilities during a disruption and are prepared to execute the BCDR plan.

6.     Continuous Improvement: A BCDR strategy is not a one-time exercise. It needs to be continuously reviewed, updated, and improved to ensure its effectiveness in the face of evolving threats and changing business requirements. Businesses need to conduct periodic reviews and assessments to identify potential gaps in the plan and address them promptly.

In conclusion, a BCDR strategy is critical for businesses to ensure continuity of operations during a disruption. It needs to include components such as a Business Impact Analysis, Risk Assessment, Business Continuity Plan, Disaster Recovery Plan, Testing and Training, and Continuous Improvement. By developing a robust BCDR strategy, businesses can minimize the impact of disruptions and ensure business continuity.

 

 

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy, develop the necessary solutions, and bring expert advice to your toughest challenges.

 

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
The Human Factor: The Importance of Individuals in Information Security

In today's digital age, information security has become an increasingly important concern for individuals, organizations, and governments alike. While technological solutions such as firewalls and encryption algorithms play an essential role in protecting sensitive data, the human factor of information security is equally crucial. In this blog, we will explore the human factor of information security and the role that individuals play in ensuring the safety of sensitive data.

The human factor of information security refers to the actions and decisions made by individuals that can impact the security of digital systems and data. While many people may assume that the majority of cybersecurity threats come from external sources, such as hackers or malware, studies have shown that a significant percentage of security breaches are caused by human error or malice.

One of the most common forms of human error that can lead to security breaches is weak passwords. Many people use easily guessable passwords, such as "password" or "123456," or they reuse the same password across multiple accounts. This makes it easier for hackers to gain access to sensitive data by simply guessing or cracking a user's password.

Another common form of human error is phishing. Phishing is a type of social engineering attack that tricks users into divulging sensitive information, such as usernames and passwords, by posing as a trustworthy entity, such as a bank or email provider. Phishing attacks can be difficult to detect, and they often rely on users being unaware of the risks of clicking on suspicious links or downloading malicious attachments.

In addition to human error, human malice can also be a significant threat to information security. Insider threats, which are security breaches caused by employees or contractors with access to sensitive data, can be particularly devastating. These threats can range from intentional data theft to accidental data loss caused by a lack of training or awareness.

So, what can individuals do to improve the human factor of information security? One of the most important steps is to increase awareness and education about cybersecurity risks and best practices. This can include training programs for employees, as well as public awareness campaigns aimed at the general public.

Another important step is to implement strong password policies, including requirements for long, complex passwords that are changed frequently. Two-factor authentication can also provide an extra layer of security by requiring users to provide a second form of verification, such as a text message or fingerprint scan, in addition to their password.

Finally, it's essential to create a culture of security that emphasizes the importance of protecting sensitive data. This can include policies around data access and sharing, as well as regular audits and risk assessments to identify and address potential security threats.

In conclusion, the human factor of information security is a critical aspect of cybersecurity that cannot be ignored. While technological solutions are essential, they are not enough to protect against the threats posed by human error and malice. By increasing awareness and education, implementing strong password policies and two-factor authentication, and creating a culture of security, individuals can play a significant role in ensuring the safety of sensitive data.

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
Keep Security Simple

The cybersecurity threat landscape continues to grow in complexity.  Cybersecurity is changing and with it a lot of noise has been created.  The shiny “nice – to- have” solutions get all the advertising and talk at conferences, for most organizations, this is noise that keeps them from focusing on the “need – to – have” solutions like antivirus and spam filtering. We know these aren’t enough, but they are a start. It’s kind of like not checking your tires on a motorcycle to see if they are aired properly and not worn out.  On a motorcycle your tires are the first line of defense for keeping you safe on the road.

 It is the same thing with cybersecurity.  Passwords are both the first line of defense and often the weakest link.  Passwords without multi-factor authentication (MFA) are by far the most glaring threat to your organization’s security, not some complicated back door exploit.

 Passwords are difficult to manage properly and are prone to user error.  Even complex passwords can be easily bypassed today.  If they were part of a breach over the years, even easier.  The point is this, if a bad actor wants to get into your network, they will target users and their passwords first, with a high rate of success.

 

MFA is a simple solution with great benefit

 MFA increases your security exponentially.  Instead of a simple string of text, MFA requires a secondary proof of identity to gain access to an account.  Examples include a PIN sent to your phone, a fingerprint scan, or a mobile authentication app.  According to Microsoft, adding MFA to your identity strategy provides a 99 percent improvement to your security.

 There is no reason to ignore MFA.  Identity access control is so critical that MFA is a must-have.  MFA is now a requirement of both cyber-insurance policies and multiple standards for government, medical and manufacturing.  If it is not already required by your insurance, it will be part of your renewal.  If MFA is not employed, obtaining a renewal and or new coverage is next to impossible.

 

Other Simple Solutions That Will Benefit Any Organization

 In addition to implementing MFA, there are some other simple things that we encourage every business to implement and be resilient:

  • Perform A Business Impact Analysis (BIA).  A BIA identifies the critical processes of your business and the assets that support them.  It shows where there are interdependencies and the order in which your assets should be recovered in the event of ransomware or other adverse event.  The BIA is the foundation of building a resilient organization.

  • Engage in a Critical Controls Assessment to identify, estimate and prioritize risk to your organizations infrastructure, policies, and operations.  Understanding control gaps and the risk they pose allow appropriate conversation and decision on making the company more resilient

  • Perform Perimeter Cyber Defense Monitoring by scanning your external environment monthly to identify vulnerabilities and understand what you look like to attackers.

  • Invest in cyber-liability insurance.  The cost of a ransomware attack is staggering. Between the ransom, the cost of recovery, and the downtime required to restore you network, it’s enough to close some businesses for good.  Cyber-liability insurance can help with costs insuring you are resilient and continue operating.

 

 

OCTELLIENT - Our mission: Keep information security simple. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

 

Ask us about Propulsion- CISO as a Service and Deepwater - Project Engagement

info@octellient.com

www.octellient.com

Chris CathersComment
Pay Now, Pay Later

It’s winter in Minnesota, which means snow and storms.  When a storm is coming, the crews put the plows on their trucks well ahead of time.  Every one of us is doing the same, pulling our shovels out of storage or buying a new one or starting the snowblower well before we ever need it.  We do it early to save the pain of having to do it when it is cold and snowing.  The last thing you want to do is try to track down a shovel or salt, or worse yet deal with a snowblower that won’t start once the storm is upon us.

We should take this same approach in our personal and business lives and yet so many refuse to prepare themselves and their businesses until they are in the middle of the storm.  In their personal lives they wait until a medical condition to get their fitness in check.  They wait until their finances are in ruins to get their affairs in order.  And in business they wait until they have a ransomware attack before they start taking security seriously.

Why are so many small and midsized businesses waiting around?  Is it a lack of knowledge and understanding?  Is it not believing they have something worth protecting?  Is it the cost of implementing solid security principals?  No matter the reason, recognizing that storm is upon us is key. 

Ransomware is on the rise with the latest prediction that global ransomware damage costs will reach $20 billion this year (article).  Seeing these attacks impact business of all sizes is tough, but especially so for those in the small and medium business (SMB) space.  The cost of falling victim to an incident like ransomware can be many times more than the cost of investing in the people, process and technology that can stop incidents (or at least lessen their impact) in the first place, something many organizations only fully realize after it’s too late.

The ransomware we are seeing today is far more sophisticated that what we have seen in the past and has become more difficult to detect.  Phishing emails look more authentic than ever.  Ransomware-as-a-service has gone mainstream.  Attackers with limited technical expertise can now buy a ransomware package and deploy within minutes.

Tactics have changed, not only are these ransomware gangs encrypting files and demanding a ransom, they are exfiltrating sensitive data and demanding ransom or face going public with it.  In some cases, they are attacking the technical environment of the victim by deleting boot records and partitions, increasing the time to recover dramatically.

What we have seen in 2021 is that everyone is a target.  SMBs need to start with the recognition that it’s not a question if your organization will be attacked, but rather when will an attack occur.  It is not too late to get your house in order, get your shovels out and prepare for the coming storm.

Every attack is different just like every business is different, however, there are some high-level practices that all organizations should adopt, like putting the plow on the truck.

  • Executive buy-in

    • To do it right, support must come from the top level of the organization.  Security must become a core part of the organizational culture.

  • Fully understand your risk profile

    • Seek to understand the attack vectors for your industry and what is valuable to your organization – then security initiatives can be created, supported, and promoted in the organization

    • Identify and classify different cyberattack scenarios

  • Take threats seriously

    • Many organizations understand the full extent of the damage that can be done during an attack as well as the aftermath.  However, many companies choose to ignore the possibility of such an attack happening to them…this is not a viable business strategy in today’s threat climate.

  • Policy enforcement

    • Policies should be simple and documented.  They should include executive support and be part of the culture that everyone chooses to follow

  • Training

    • Security awareness and policy enforcement are the foundation to creating a security culture in an organization.  Creating awareness of policies whether security or otherwise, should be a top priority of all organizations

  • Offline backup of critical data

    • Data is the lifeblood of an organization.  Data loss causes brand and financial damage, many never fully recover from these events.  Many options for offsite backup exist today and shouldn’t be overlooked.

  • Invest intelligently in security

    • Focus on creating a plan based on the needs of your organization and implement policies and tools that support the plan.  This can be challenging given the information overload and thousands of vendors pitching a thousand “best practice” models and tools.

  • Keep systems updated

    • Simply apply patches to software and hardware systems on a timely schedule.

Pay Now

With the average data breach cost in 2021 of $4.24 million involving 21+days of downtime, the cost is high and is an immediate impact to your business.  This pay later strategy is stressful, requires many resources and long hours along with fingers crossed that paying the ransom will return your data.  These events can be catastrophic to business, potentially ending the ability to continue to operate, causing them to close their doors forever.

Pay Later

Don’t wait until you are in the storm, take a pay now strategy.  Invest in your business over time, pay now to make your business resilient allowing it and your employees to weather the storm when it comes.  Put the plow on the truck early, make sure the snowblower runs and operates and pull the shovels out of storage, take the proactive approach, and deploy the suggestions above.  Need help?  A vCISO can help your organization prepare itself and limit its risk damage and downtime when these events happen.  Sleep well knowing that you have done everything you can to limit the stress, damage and impact the storm can have.

 

 

OCTELLIENT - Our mission: simplify information security. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
Complexity is the Killer of Achievement

Information Security is a daunting task.  With information and data flowing across countless systems, networks, and devices, protecting it from seemingly unending threats approaches the untenable.  

Along with the rapid evolution of the threat landscape is a flurried array of defense solutions.  Organizations are caught in a “more is better” approach, yielding a complex security stack that is not well integrated or utilized.   Emotional peace dwindles in the stress of value.  The lack of integration, attention, utilization, and understanding creates more vulnerable surface area as time elapses.  In the end, the inevitable questions begin: What are we getting from our stack? , Is this working? , Do we have the right solutions? , Are they implemented correctly? , Do we have the right people? … the list goes on, and the cycle continues…

The Cost is High

Multiple solutions, multiple dollars – this goes without saying, but what is often overlooked and at a minimum underestimated, is the cost of talent.  No matter how “NextGen”, “AI”, “ML”, or “Managed” something is, you must have engaged individuals to interact, utilize, and maintain it.

Just as much as buying isn’t a strategy, assigning isn’t a tactic when it comes to security operations.  It takes a multifaceted alignment.  Flooding an individual with data isn’t better, it’s demoralizing.  Generating alerts for a team isn’t visibility, it’s fatigue.

Simplify to Mature

It takes somewhere around 280 days for an organization to become aware of data loss. This number hasn’t significantly changed in proportion to the spend of defense solutions.  Is the fix, “just one more?”  The stack is tall and deep, but is it made of stone or sand?  We must stop the cycle of more is better, we must get lean and mean.  We must value high function over high capability.  To get there we start from the top and ask the right questions early and often. We must have a clear mission and clear assignments -- that are within our means.  The organization may have a different idea than what the investment will allow – you must level set.  Realistic expectations result in real results.  Competent management starts with realistic expectations and leadership to realistic results.  InfoSec is not a space to overpromise, delivery is hard!  In the end, this proper strategic alignment influences our buying and tasking decisions, all of which will benefit the organization and its employees.  Even though it’s not the “moon shot”, it is a solid foundation from which to mature. Focus on creating a high functioning team, supported by the right tools, not all the tools.

 

OCTELLIENT - Our mission: simplify information security. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
Are You Pickin’ up What I’m Puttin’ Down?

We’ve underscored the importance that “everyone is in security,” but we must be careful not to  assume they understand everything we are saying. Remember, most individuals we interact with are not security professionals. So, how can we develop a security culture and help them understand basic security principles? First, we lead through effective communication. Consider the following areas:

Keep it Simple

SSO, DDoS, Ransomware, Phishing, etc. are all common knowledge terms; but common only to professionals.  Even if our audience has heard the term, they likely don’t know the full meaning and detail behind it.  It’s our job to educate -- keep it simple. Use illustrations and analogies that your audience is familiar with to help them understand.  Don’t underestimate the power of stories -- Real life examples spark interest and make boring material memorable. So, get out of the policy reading and regulatory fear.  Know your audience, reach your audience!

Focus on Team

Because security is a team sport, we are only as strong as our weakest link.  Everyone in the company needs to put up a solid defense to keep themselves, their coworkers, and the organization safe and secure. Having regular and interesting awareness campaigns establishes a “same boat” conversation and promotes the idea that everyone has a role on the team.  Be sure to take advantage of large change events, such as new technology rollouts, reorganization, etc.  These “all hands” moments, when properly integrated, and help promote “team” over change.

Can Do

Be positive: avoid fear and can’t.  Everything, especially over the past year, has been about what we can’t do – restrictions.  Position and present to the positive side. True, warnings are integral to security, but let’s motivate and promote efforts to protect versus setting a stage of frustration.  Know that everyone today is easily overwhelmed -- let’s not add to their plate, let’s ask for their help.

Lead the Team

Use the technology, access methods, privileges, and tools that you are asking to be used.  Experience the experience – know what “the real world” is like.  Be familiar with your organization, department functions, and a wide field individuals throughout the organization. Know what’s working and what’s frustrating. These efforts reinforce that we are bringing the same level of commitment to the team that we are asking for.

Consider the C-suite litmus test: are there special allowances or functional differences in C-suite compared to the typical user?   If so, you must examine the why:  Does it not work that well? Is the experience frustrating? Are we trading risk for convenience that would otherwise be unacceptable?  The C-suite is the leadership of the entire team, they should be well aligned and honestly able to promote security.  If we are afraid of the C-suite when implementing a process, tool, control, or method, likely the ask, the education, the communication, and/or the solution is just not good enough! So why are we asking anyone else to do it?

OCTELLIENT - Our mission: simplify information security. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
Party like its 1996

Welcome to the Party

Ransomware is a type of malicious software (malware) that restricts access to data or otherwise holds data until a ransom payment is made. Quite often encryption is the primary method of making data inaccessible to the owner, while the nefarious actor holds the key to decrypt.  This notion of using encryption offensively was first discussed in 1996 by Young & Yung. They coined the malicious use of encryption as “cryptovirology”.

From then to now ransomware attacks are on the rise with an estimated global cost to global organizations estimated to be $20 billion this year.  Ransomware attacks continue to become more elaborate and more targeted, the human factor, more often than not, is the key to defense.  Yes, people are the avenue of attack, as they click on malicious links, and open malicious attachments, however, there is no replacement for good human judgement.   Having an organization culture where everyone is in security -- looking for anomalies in their day-to-day processes, being aware of the request they are receiving in email, reviewing configurations before they go live – creates a formidable defense against threat actors. (See “Everyone is in Security”  from December 2020). 

The Party was never fun

Historically, we have been dealing with ransomware, that like most malware, is indiscriminate and opportunistic. Without question this “commodity” ransomware has been effective in its ability to disrupt its victims and extort money.  But a new trend is emerging where ransomware is being deployed by threat actors in a “hands on fashion”.

Threat actors are specifically attacking organizations with the purpose of injecting ransomware.  As they actively penetrate, they are leveraging information known and gathered, including configurations and harvested credentials to plant and execute ransomware.  Effectively, giving the threat actor a diversified on-demand ransom capability.  So unlike a traditional malware infection and execution that has typically identifiable footprint and path this attack methodology presents an unknown scope of infection and capability.

Shut the party down

There is no magic or silver bullet, security today is still about fundamentals.  Consider these few, as you ask “Are we ransomware resilient?”

  • Ensure your anti-malware software is up to date – these packages monitor your files for unexpected behavior and excessive access

  • Filter emails before they reach your employees – using content and email filtering, should take care of many phishing and ransomware scams

  • Train employees to recognize suspicious emails – don’t open emails from unrecognized senders, don’t click on links you aren’t sure are legitimate and avoid opening attachments you aren’t sure about.

  • Apply Software patches to keep systems up to date – as painful and tedious as it is, this is vital to your security.

  • Change default passwords everywhere – don’t reuse passwords, make them complex (password vaults help) and use multi-factor authentication where every possible.

  • Make it harder for attackers to roam your networks – only give employees access to what they need to perform their duties, limit administrative accounts, and segment the networks where possible.

  • Understand what is happening on your network – baseline and monitor either internally or with a managed detection and response vendor

  • Inventory your assets – know what is connected to your network.

  • Know what data is most important – have a secure and up to date backup of all business-critical information, you must know your recovery point objectives (RPO), it will drive your backup strategy!

  • Durable backup – durable means: survivable; not just time and environment, but attack, think about your strategy and implementation -- Will you just end up backing up the encrypted data?

  • Have good change management – control your change, know your change

  • Have a plan to respond to a ransomware attack and test it. –  should be part of business continuity and disaster recovery

  • Think long and hard before paying a ransom – there is no guarantee you will get your data back

 

OCTELLIENT - Our mission: simplify information security. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

 

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Chris CathersComment
More Implications of Solarwinds: Insurance

The far reaching and undiscovered effects of Solarwinds and the fact that breaches are on the rise has actuaries adjusting their models and sharpening their pencils.  It is important to know exactly how your cyber/breach insurance policies work and what the performance requirements are.  As you go to renew, expect that there will be new and adjusted requirements and limitations. 

Insurance is an important back stop in our control stack; and like any other control, we need to know what it does and how effective it is. Check out this video from my friend Joseph Brunsman.  As an insurance specialist he outlines some of the important things to know about likely performance requirements for policies today, and changes in policy requirements and scope at renewal.  He reviews important areas such as notice, potential claims, policy periods, attribution, and the like.

With the ever narrowing scope and rising cost, transferring risk has diminishing returns. We can be sure that post-Solarwinds, our mix of controls and our risk thresholds will change.  Just as with the actuaries and underwriters in the insurance industry, we too need to adjust our risk management models.

In this video Joseph discusses three potential insurance implications of the Solarwinds breach/incident.


OCTELLIENT - Our mission: simplify information security. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

 

Chris Cathers