PROACTIVE RISK
  • About
    • STAFF
    • Portal
    • Our Manifesto
    • Capabilities Summary
    • Simple Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • 800 lb Gorilla
  • MANAGED SERVICES
    • Cyber Recruiter
    • Fractional CIO/CISO
    • MeasureRISK®
    • Policies and Plans
    • Threat Modeling
    • FilterIT
    • ManageIT®
    • PhishIT®
    • MonitorIT®
    • Development
    • Supply Chain Risk
    • Domains | DNS
    • CATSCAN®
    • Physical Security
    • ProtectIT®
    • FINDIT®
    • eDiscovery
    • Backup Resiliency
    • Cyber Spend
  • RESOURCES
    • BLOG
    • Breach Laws
    • Videos
    • Guides | Tools
    • Support
  • Contact Us

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

Introducing the inaugural NJBIZ Veterans in Business honorees

9/26/2023

Comments

 
NJBIZ is proud to introduce the inaugural recipients of the Veterans in Business awards. 
https://njbiz.com/introducing-the-inaugural-njbiz-veterans-in-business-honorees/ 

Created by NJBIZ Associate Publisher and General Manager AnnMarie Karczmit in honor of her late father, who served in the Korean war, this new program recognizes veterans who are making a significant impact on New Jersey business as well as continuing to give back to their community. 

This year’s 41 honorees served across the United States’ military branches, including the Air Force, Air National Guard, Army, Marines, Navy and Coast Guard. 
The judges for this year’s awards – who are all military veterans themselves – were: Dominick Belfiore, vice president business banking relationship manager, M&T Bank; Eddie Condello, vice president, team leader and commercial lending officer, Columbia Bank; and Schone Malliet, CEO and president, Winter4Kids. 
Please join us for a virtual awards ceremony at 8:30 a.m. Nov. 7 to honor these individuals. Registration information will be available on the event page. 

NJBIZ will also recognize the honorees in a special section included in the Nov. 20 issue of NJBIZ. 
For sponsorship opportunities, please contact Karczmit at akarczmit@njbiz.com.
Congratulations to the 2023 Veterans in Business honorees! George Akins, director of clinical pastoral services education and pastoral care

George Akins, director of clinical pastoral services education and pastoral care
Hackensack Meridian Health

Eric Basek, chief operations officer
Remarkabl

Tom Brennan, ethical hacker
Proactive Risk Inc.

Alyza Brevard-Rodriguez, CEO and founder
SW3AT Wellness x The Other Side Dispensary

William Brown, president
Veteran Alumni of Rutgers University and Navy SEAL Foundation

JP Buss, managing partner
Thunderbolt Solutions

Ronald Campione, senior council
DOWC LLC

Jeff Cantor, CEO
NJ State Veterans Chamber of Commerce

Joseph Chinnici, banking center manager
Provident Bank

Dan Conley, active angel investor
Angels + LifeSci Investors Network, NJAngels.net

Francisco Cortes, president and co-founder
NJ State Veterans Chamber of Commerce

Brett D’Alessandro, president
Backpacks For Life

Dennis Devery, vice president for enrollment management
Thomas Edison State University

Russell DiNardo, president and founder
ThinkForm Architects

Michael Ferraro, chief career door opener
Bridging the Gap for Veterans

Andrew Frazier, founder
Small Business Pro University

Porfirio Garcia, director of marketing
Greater Elizabeth Chamber of Commerce / Elizabeth Tourism

Michael Griffinger, senior director (retired)
Gibbons PC

John Hoffmann, certified public accountant
Independence Financial Services LLC

Cindy Jebb, president
Ramapo College of New Jersey

Joshua King, senior vice president, Supply Chain and Strategic Projects
American Water Works Co.

Michael Lafferty, general manager
Recycling Management Resources

Ryan Leonard, CEO
NJF Worldwide LLC

Oliver Lewis Jr., executive vice president, head of commercial banking
Columbia Bank

Jack Licata, president
Fast Bags Corp.

Jonathan Loane, vice president, Finance, Global MedTech Supply Chain
Johnson & Johnson

Lance Lopez Sr., project manager, Veterans and Community Recruitment
New Jersey Manufacturing Extension Program (NJMEP)

Christopher Manente, founding executive director
Rutgers Center for Adult Autism Services

James Marshmon, director, Student Development and Campus Life
Berkeley College

Antonio Martinez, president and CEO
Renaissance Global Services LLC

Cathy McBarnette-Neilley, founder and president
Spin Doctor Laundromats LLC

John McCarthy, partner
Schenck, Price, Smith & King LLP

Robert McGowan, chief operating and finance officer
Chiesa Shahinian & Giantomasi PC

Keith McWha, partner
Lerner David LLP

Kevin O’Connor, chair, Business Litigation; co-chair, Labor and Employment
Peckar & Abramson PC

John Prutting, veterans outreach coordinator
Angelic Health Hospice and Palliative Care

Brendan Rezny, senior vice president, retail regional manager
M&T Bank

Steven Robles, vice president
Citibank

Tom Scazzafavo, partner
EY

David Van Bever, executive director, Environmental and Transportation Services
Holy Name

Andrew Wood, chief financial officer
APi Group Inc./J. Fletcher Creamer & Son Inc.


Comments

its a people problem

9/21/2023

Comments

 
​In today's digital landscape, cybersecurity is of paramount importance for organizations across all industries. Despite extensive investments in advanced security technologies, a company's employees can be a significant vulnerability. Some employees may inadvertently put their organization at risk by clicking on phishing links, falling for scams, or unknowingly downloading malware. While these actions can expose an organization to potential threats, it is essential for management to address these issues with a constructive and proactive approach.
 
Identifying the Problem
The first step in managing employees who are cybersecurity liabilities is to recognize the problem. Some individuals may not fully understand the consequences of their actions or the various techniques used by cybercriminals to exploit vulnerabilities. It is crucial to approach this issue with empathy and understand that not everyone has the same level of cybersecurity knowledge.
 
Creating a Culture of Cybersecurity
Fostering a culture of cybersecurity awareness is essential for any organization. Management should implement regular training sessions and workshops to educate employees about the latest cybersecurity threats, best practices, and safe online behaviors. These sessions should be interactive, engaging, and tailored to suit the diverse learning styles of the workforce.
 
Encouraging Reporting and Learning from Mistakes
To address the issue effectively, it is essential to create an environment where employees feel comfortable reporting potential cybersecurity incidents or their own mistakes. This will help management identify problem areas and offer personalized guidance to individuals who need it. Promoting a blame-free culture will encourage employees to be more proactive in their cybersecurity practices.
 
Customizing Training Programs
Not all employees have the same level of technical expertise or knowledge when it comes to cybersecurity. By customizing training programs based on individual roles and responsibilities, management can ensure that employees receive targeted and relevant education. Some employees may need more hands-on training, while others might benefit from online resources and simulations.
 
Incentivizing Good Cybersecurity Practices
Positive reinforcement can be a powerful motivator. Management can create incentives for employees who consistently display good cybersecurity practices. Recognizing and rewarding employees who report potential threats, complete cybersecurity training, or contribute to improving the organization's security posture will encourage others to follow suit.
 
Collaborating with IT and Security Teams
A strong collaboration between management, IT, and security teams is crucial in addressing cybersecurity concerns. These teams can work together to identify common weak points and develop targeted solutions to enhance the organization's overall security measures. By understanding the patterns of employee vulnerabilities, IT and security teams can focus on implementing specific technical controls and threat detection mechanisms.
 
Balancing Strengths and Weaknesses
An employee's value to the organization should not be solely based on their cybersecurity knowledge. While a lack of cybersecurity awareness can be concerning, it should be balanced against their strengths in other areas. If an employee excels in their core responsibilities and demonstrates dedication and commitment, management should consider providing additional support and resources to improve their cybersecurity know-how.
 
Conclusion
Managing employees who pose cybersecurity liabilities requires a combination of understanding, education, and collaboration. By creating a culture of cybersecurity awareness, customizing training programs, and incentivizing good practices, organizations can significantly reduce the risk of cyber threats. Additionally, strong collaboration between management, IT, and security teams is vital in implementing comprehensive cybersecurity strategies.
While cybersecurity awareness is essential for all employees, it is equally crucial to acknowledge an individual's overall contributions to the organization. With a proactive and supportive approach, management can work with employees to improve their cybersecurity know-how, ensuring a safer digital environment for the entire organization.
 
Comments

PROACTIVE RISK MANAGEMENT

9/11/2023

Comments

 
A source of confusion for many is the defined summary of risk types.  Below is a summary to help you better classify it when speaking to it internally or externally. 

First-Party Risk:
First-party risk, also known as internal risk, involves threats that originate from within the organization itself. These risks typically result from the organization's own actions, decisions, or internal processes. Examples of first-party risks in cybersecurity include employee errors, insider threats, and inadequate security policies or practices.

Second-Party Risk:
Second-party risk, often referred to as partner or supply chain risk, arises from the relationships and interactions between an organization and its business partners, suppliers, or vendors. This type of risk occurs when the actions or vulnerabilities of these external entities can directly impact the organization's security and operations. For instance, if a supplier experiences a data breach, it could expose sensitive information of the organization.

Third-Party Risk:
Third-party risk expands on second-party risk and involves potential threats associated with a broader network of external entities. This includes not only business partners and suppliers but also service providers, contractors, and any other third parties that the organization interacts with. Cybersecurity third-party risks can stem from these entities' cybersecurity practices, data handling, and other factors that may affect the organization's security posture.

Fourth-Party Risk:
Fourth-party risk is a relatively newer concept and relates to the risk associated with third-party relationships. It involves assessing the security practices and vulnerabilities of the vendors, partners, or service providers used by third parties with whom the organization has a direct relationship. In essence, it's the risk associated with your third party's third parties. Understanding fourth-party risk is important because the security of your third parties can indirectly impact your organization's security.

Now that we have it broken down. Next is to MeasureRISK - click here for more information.
Comments

Harnessing the Power of Microsoft Defender and Sentinel

9/7/2023

Comments

 
In today's digital landscape, organizations face a constant barrage of cyber threats, making robust cybersecurity measures a top priority. One effective approach to defending against these threats is the integration of Microsoft Defender for Endpoint (Defender) and Azure Sentinel into a comprehensive Extended Detection and Response (XDR) strategy. In this blog post, we will explore the power of Microsoft Defender and Sentinel for XDR and provide valuable configuration tips to help organizations maximize their cybersecurity defenses.

Understanding the Power of Microsoft Defender and Sentinel for XDR

1. **Real-time Threat Detection**: Microsoft Defender for Endpoint is a cutting-edge endpoint security solution that leverages artificial intelligence and machine learning to detect and respond to advanced threats in real-time. It provides deep insights into endpoint activities and helps identify malicious behavior.

2. **Centralized Data Collection**: Azure Sentinel, on the other hand, is Microsoft's cloud-native SIEM (Security Information and Event Management) solution. It collects and correlates data from various sources, including Defender, to provide a unified view of an organization's security posture.

3. **Seamless Integration**: The true power of Defender and Sentinel for XDR lies in their seamless integration. Security incidents detected by Defender can be sent to Sentinel for further investigation, analysis, and response. This integration enables a coordinated and holistic approach to threat detection and response.

Configuration Tips for Optimum Value

Now, let's delve into some configuration tips to harness the full potential of Microsoft Defender and Sentinel for XDR:

1. **Enable Defender Advanced Features**:
- Ensure that advanced features such as attack surface reduction rules, endpoint detection and response (EDR), and automatic investigation and remediation are enabled in Microsoft Defender for Endpoint.
- Regularly review and update security baselines to align with your organization's security policies.

2. **Fine-Tune Alert Policies**:
- Customize alert policies to match your organization's threat landscape. Focus on high-priority alerts and reduce noise by tuning policies.
- Leverage the Threat & Vulnerability Management dashboard in Defender to identify vulnerable systems and prioritize patching.

3. **Integration with Azure Sentinel**:
- Configure connectors in Azure Sentinel to ingest data from Microsoft Defender for Endpoint.
- Use built-in playbooks or create custom automation workflows to respond to incidents automatically.

4. **Advanced Hunting Queries**:
- Take advantage of Azure Sentinel's advanced hunting capabilities to proactively search for threats and unusual activities in your environment.
- Create custom KQL (Kusto Query Language) queries to extract meaningful insights from collected data.

5. **Continuous Monitoring**:
- Establish continuous monitoring practices by setting up scheduled queries and alerts in Azure Sentinel.
- Regularly review incidents, investigate false positives, and refine your detection rules.

6. **Incident Response Planning**:
- Develop a robust incident response plan that integrates both Defender and Sentinel.
- Conduct tabletop exercises to ensure your team is well-prepared to respond to security incidents effectively.

Conclusion

Microsoft Defender for Endpoint and Azure Sentinel, when configured effectively, offer a powerful XDR solution that can significantly enhance an organization's cybersecurity posture. By following these configuration tips and staying vigilant, organizations can harness the full power of these tools to detect, respond to, and mitigate cyber threats in a rapidly evolving digital landscape. Embracing the synergy between Defender and Sentinel is a key step toward a more secure future.

Conatct us today to learn more
Comments

Woof Woof security policy

8/28/2023

Comments

 
I was asked to write a basic information security policy for my veterinarian office who is concerned about basic business hygiene came out pretty good... so I am sharing here for all those that help keep our pets healthy..

Version 1.0 – WoofWoof Edition
Welcome to our veterinary clinic's Pawsitively Secure Information Security Policy! Just as we care for our furry friends, it's time to ensure the safety of our digital den. Remember, a safe cyber habitat keeps tails wagging and whiskers twitching!

Section 1: Kibble-Proof Passwords
Just like hiding your treats, protect your passwords! Create strong, unique passwords for your accounts. Mixing uppercase, lowercase, numbers, and special characters is like giving hackers a puzzle they can't solve.

Section 2: Feline-Proof Phishing Defense
Beware of cyber-cats! If an email seems fishy, don't bite the bait. Verify suspicious links and don't give out personal info. Our clinic doesn't need a catfish in the network!
​
Section 3: Guard-Dogged Devices
Your devices are like watchdogs – they keep an eye on your data. Lock screens, guard tablets, and leash your laptops when not in use. Prevent unauthorized squirrels from digging up sensitive data.

Section 4: Litterbox Clean-Up (Data Disposal)
Dispose of data responsibly. Just as you scoop out the litterbox, shred or delete sensitive files when they're no longer needed. No digging up old bones here!

Section 5: Tail-Wagging Updates
Keep your software updated like a wagging tail. Regular updates fix vulnerabilities and bugs – think of them as obedience training for your apps!

Section 6: Fetching Firewall Defense
Our clinic's firewall is like a sturdy fence – it keeps out unwelcome visitors. Don't disable it, or cyber-critters might sneak in and chew on our digital shoes.

Section 7: Lap-Dogged Laptop Security
If you're a mobile hound, secure your laptop! Don't leave it in hot cars or tempting dog parks. It's not just about biscuits – protect your data from thieves!

Section 8: Virtual Private Playpen (VPN)
If you're working from afar, use a VPN for a private playpen. It encrypts your data, making it as secure as a puppy cuddle.

Section 9: Guarding the Treat Jar (Admin Access)
Admin access is like the treat jar – only for trusted handlers. Don't share your admin keys, or else you might find rogue raccoons in the system!

Section 10: Incident Flea-Control Plan
In case of a cyber-flea infestation (a breach), report it immediately! We'll take action to scrub away those pesky bugs and keep our digital domain sparkling.
Remember, just as you protect your furry pals, safeguarding our digital domain keeps our clinic running smoothly. Thanks for being a part of our Pawsitively Secure team – where cybersecurity and pet care collide in the most tail-wagging way!

By following these guidelines, you'll help us maintain a safe and secure cyber-environment for all our four-legged and two-legged friends. Keep up the good work, and let's keep those cyber-paws off our data and tails high! 🐾🐶🐱🦔🐾

Comments

How to conduct a NIST Cyber Security Framework assessment

3/25/2023

Comments

 

The NIST Cybersecurity Framework (CSF) provides a structured approach to assess an organization's cybersecurity posture. Here's a step-by-step guide to conducting a cyber assessment using the NIST CSF Framework:
  1. Identify the Scope and Objectives of the Assessment: Determine what the assessment will cover, such as a specific system or a broader network, and what the goals of the assessment are, such as identifying vulnerabilities, assessing risks, or evaluating compliance.
  2. Conduct a Current State Assessment: Evaluate the organization's current cybersecurity posture against the five core functions of the NIST CSF Framework: Identify, Protect, Detect, Respond, and Recover. Use the NIST CSF to identify gaps and vulnerabilities that need to be addressed.
  3. Develop a Target State Assessment: Define the organization's desired future state of cybersecurity, based on the results of the current state assessment. This target state should align with the organization's overall goals and objectives.
  4. Analyze Risks: Identify and assess potential risks to the organization's cybersecurity. Determine the likelihood and impact of each risk, and prioritize them based on their potential impact.
  5. Develop a Plan of Action: Develop a plan to address the identified gaps and vulnerabilities, based on the target state assessment and risk analysis. This plan should be tailored to the organization's specific needs and resources.
  6. Implement the Plan: Implement the plan of action to address the identified gaps and vulnerabilities. This may involve deploying new technologies, updating policies and procedures, or providing training to employees.
  7. Monitor and Measure Progress: Continuously monitor and measure the organization's cybersecurity posture to ensure that the plan of action is effective. Use metrics to track progress and identify areas that require further attention.
  8. Update the Assessment: Periodically update the assessment to reflect changes in the organization's cybersecurity posture, such as new technologies or evolving threats. Use the results of the assessment to inform ongoing cybersecurity efforts.
By following these steps, organizations can use the NIST CSF Framework to conduct a comprehensive cyber assessment, identify gaps and vulnerabilities, and develop a plan of action to improve their cybersecurity posture.

To learn more about our MeasureRISK service contact us today
Comments

pulling teeth and cyber security

3/21/2023

Comments

 
Dentists and healthcare professionals, like other businesses, need to protect sensitive patient data and comply with industry-specific regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States. They often utilize various non-legal cybersecurity services from specialized service providers to ensure the security and privacy of their patients' data and maintain compliance. Some of the common cybersecurity services utilized by dentists and healthcare professionals include:
  1. Risk assessment and compliance: Identifying potential risks and vulnerabilities within the healthcare organization's information systems and networks, and ensuring compliance with relevant regulations, such as HIPAA or GDPR.
  2. Security policy development and implementation: Developing, implementing, and maintaining comprehensive security policies and procedures tailored to the unique requirements of a healthcare environment.
  3. Data encryption and protection: Implementing and managing data encryption technologies and practices to protect sensitive patient information during storage and transmission.
  4. Secure communication solutions: Providing secure communication tools and platforms for healthcare professionals to share patient information and collaborate with colleagues without compromising data privacy.
  5. Endpoint security: Securing devices, such as computers, tablets, and mobile phones, that connect to the healthcare organization's network to prevent unauthorized access and malware infections.
  6. Network and system monitoring: Continuously monitoring the healthcare organization's networks, systems, and applications to identify and respond to potential security threats or incidents.
  7. Managed security services: Outsourcing day-to-day cybersecurity operations, monitoring, and incident response to a third-party provider that specializes in healthcare security.
  8. Security awareness training: Educating healthcare staff on cyber threats, security best practices, and regulatory requirements to improve the overall security culture and reduce the risk of human error.
  9. Incident response and disaster recovery planning: Developing and implementing plans and procedures to identify, contain, and recover from cyber attacks or security incidents, as well as maintaining business continuity during disasters.
  10. Backup and recovery solutions: Implementing and managing secure, compliant data backup and recovery solutions to ensure the availability and integrity of critical patient information.
By utilizing these cybersecurity services, dentists and healthcare professionals can enhance the security of their patient data, maintain regulatory compliance, and reduce the risk of costly data breaches or other security incidents
Comments

proactive security testing

2/23/2023

Comments

 
Conducting a comprehensive cyber security penetration test assessment for a commercial business involves asking a wide range of questions to ensure that all potential vulnerabilities and weaknesses are identified and addressed. Here are some key questions to ask when conducting a penetration test assessment for a commercial business:
  1. What are the critical assets defined by the business.
  2. What are the potential attack vectors that a malicious actor could use to gain access to these critical assets?
  3. What are the current security controls in place, and have they been validated?
  4. Are there any vulnerabilities in the system that have already been identified by your own internal vulnerability assessment?
  5. How are employee accounts and privileges managed. 
  6. How are software and hardware updates managed. 
  7. What unique protocols, ports or services exist.
  8. How are backups managed, and are they regularly tested and validated?
  9. Are there any third-party vendors or partners with access to the system, and how are they managed from a security perspective?
  10. What are the key business functions that could be impacted by a successful cyber attack, and what is the potential impact to the business in terms of financial, reputational, or legal risks?
By asking these and other related questions, a cyber security professional can gain a comprehensive understanding of the organization's current security posture and identify areas that need to be improved.

If you would like to measure your security we invite you to learn more about CATSCAN
Comments

Threat Models help security

2/18/2023

 
Threat modeling is a process of identifying and analyzing potential security threats to a system or application. Here is a general process for threat modeling a custom web application connected to the internet:
  1. Identify the assets: Start by identifying the assets that need to be protected, such as sensitive data, intellectual property, or the web application itself.
  2. Identify the potential attackers: Identify the potential attackers, including their motivations and resources, such as hacktivists, insiders, or nation-states.
  3. Create a data flow diagram: Create a data flow diagram to map out the flow of data and information through the web application, including inputs, outputs, and storage locations.
  4. Identify potential threats: Identify potential threats to the web application based on the data flow diagram and the attackers identified earlier. This could include threats such as injection attacks, cross-site scripting, cross-site request forgery, or broken access control.
  5. Assess the likelihood and impact of each threat: Assess the likelihood and impact of each potential threat, taking into account the assets that need to be protected and the attackers that are likely to target the web application.
  6. Prioritize the threats: Prioritize the threats based on the likelihood and impact, and identify the ones that need to be addressed first.
  7. Develop mitigations: Develop mitigations to address the prioritized threats, such as implementing secure coding practices, using encryption, or adding access controls.
  8. Test the mitigations: Test the mitigations to ensure they are effective, including penetration testing, vulnerability scanning, or code reviews.
  9. Monitor and update: Continuously monitor the web application and update the threat model as new threats emerge or as the application changes over time.
Threat modeling is an iterative process, and the above steps may need to be repeated several times throughout the lifecycle of the web application. It is important to involve all stakeholders in the threat modeling process, including developers, security teams, and business owners, to ensure that all aspects of the application are considered and protected.

For more information on Threat Modeling, contact us.

Data breach coach?

2/18/2023

 
A data breach coach, also known as a breach response coach or cyber incident coach, is a specialized professional who provides guidance and support to organizations that have experienced a data breach. The primary purpose and function of a data breach coach are to help organizations respond to data breaches in a timely, effective, and efficient manner, minimizing the potential damage and protecting the organization's reputation.
Here is how a data breach coach can help you before, during, and after a data breach:
Before a data breach:
  • Conducting a risk assessment: A data breach coach can help you identify potential vulnerabilities in your systems and processes, and develop a plan to address them.
  • Developing an incident response plan: A data breach coach can help you create a comprehensive plan for responding to a data breach, including roles and responsibilities, communication protocols, and escalation procedures.
  • Training and awareness: A data breach coach can provide training and awareness programs for employees, so they understand the risks and know how to respond to a breach.
During a data breach:
  • Providing guidance and support: A data breach coach can provide immediate support and guidance during a data breach, helping you make critical decisions and navigate the complex legal and regulatory requirements.
  • Coordinating with third parties: A data breach coach can work with your legal counsel, IT staff, and other third-party service providers, ensuring that everyone is working together to minimize the impact of the breach.
  • Managing communications: A data breach coach can help you manage internal and external communications, including notifying affected individuals, communicating with regulators and other stakeholders, and managing the media.
After a data breach:
  • Conducting a post-incident review: A data breach coach can help you evaluate the effectiveness of your response to the breach and identify areas for improvement.
  • Addressing remediation: A data breach coach can help you implement remediation measures to prevent future breaches, such as implementing new policies and procedures, upgrading security systems, or providing additional employee training.
  • Managing legal and regulatory issues: A data breach coach can help you navigate legal and regulatory issues, including responding to any lawsuits or regulatory inquiries that arise as a result of the breach.
In summary, a data breach coach can provide valuable guidance and support to organizations before, during, and after a data breach. Their expertise in breach response and their ability to work with multiple stakeholders can help organizations respond effectively to a breach and minimize the potential damage to their reputation and operations.
<<Previous

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    View my profile on LinkedIn

    BLOG Archives

    September 2023
    August 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    RSS Feed

Contact Info

Proactive Risk Inc.
Tel: +1 (973) 298-1160
Web: www.proactiverisk.com
eMail: sales(at)proactiverisk.com

Picture
CONNECT WITH A CYBER EXPERT
© COPYRIGHT 2023. ALL RIGHTS RESERVED.
  • About
    • STAFF
    • Portal
    • Our Manifesto
    • Capabilities Summary
    • Simple Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • 800 lb Gorilla
  • MANAGED SERVICES
    • Cyber Recruiter
    • Fractional CIO/CISO
    • MeasureRISK®
    • Policies and Plans
    • Threat Modeling
    • FilterIT
    • ManageIT®
    • PhishIT®
    • MonitorIT®
    • Development
    • Supply Chain Risk
    • Domains | DNS
    • CATSCAN®
    • Physical Security
    • ProtectIT®
    • FINDIT®
    • eDiscovery
    • Backup Resiliency
    • Cyber Spend
  • RESOURCES
    • BLOG
    • Breach Laws
    • Videos
    • Guides | Tools
    • Support
  • Contact Us