IT and Business Insights for SMB Solution Providers

Tips and Advice

Blog Entry
July 19th, 2022 | Jay Ferron
 Traditional business impact analyses (BIAs) have been successfully used for business continuity and disaster recovery (BC/DR) by triaging damaged infrastructure recovery actions that are primarily based on the duration and cost of system outages (i.e., availability compromise). However, BIA analyses can be easily expanded to consider other cyber-risk compromises and remedies. - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
NIST is leveraging the new Special Publication (SP) 800-53 Public Comment Site for its first round of public comments. - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
Protecting Controlled Unclassified Information: Pre-Draft Call for Comments on the CUI Series - read more
 
Blog Entry
July 18th, 2022 | Jay Ferron
A Florida-based CEO was charged with selling $1 billion worth of counterfeit Cisco equipment imported from China, according to the Department of Justice.   - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE)  - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
This Public Service Announcement is an update and companion piece to Business Email Compromise PSA I-091019-PSA posted on www.ic3.gov. This PSA includes new Internet Crime Complaint Center complaint information and updated statistics from October 2013 to December 2021. - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
The FBI Internet Crime Complaint Center (IC3) warns of an increase in complaints reporting the use of deepfakes and stolen Personally Identifiable Information (PII) to apply for a variety of remote work and work-at-home positions. Deepfakes include a video, an image, or recording convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said. - read more
 
ASCII Forum: Trending Topics
July 6th, 2022 | ChannelPro
Hot topics trending on the members-only ASCII Group Forum. Come join the conversation... - read more
 
Blog Entry
July 6th, 2022 | Jay Ferron
 This uses vulnerabilities in Remote Desktop Protocol (RDP) to access victims’ networks - read more
 
Blog Entry
July 5th, 2022 | Jay Ferron
 NIST Announces the Release of Draft NIST IR 8323 Revision 1 | Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.  - read more
 

Pages

Subscribe to Tips and Advice