Audit Prep
|
August 26, 2024

Security Policies, Standards, Procedures, and Guidelines

All of the time and effort that goes into developing your security measures within your program is worth it. Building a comprehensive information security program forces alignment between your business objectives and your security objectives and builds in controls to ensure that these objectives, which can sometimes be viewed as hindrances to one another, grow and succeed as one.

Read More
News
|
July 22, 2024

Scammers leverage CrowdStrike outage for phishing campaign

Threat actors are leveraging the global outage caused by a flawed update deployed to CrowdStrike’s Falcon sensor to target organizations with malware. Several cybersecurity researchers and agencies have reported observing an uptick in CrowdStrike-related phishing emails, including one that offered a fictitious Hotfix update that installed a remote access tool (RAT) known as Remcos.

Read More
Audit Prep
|
July 16, 2024

Information Security and Compliance Explained

A basic understanding of information security and compliance is fundamental to the success of thousands of organizations. Unfortunately, the two terms are far too often misunderstood, mixed up, and misused. What if I told you that information security—if you understand it—can be used by your organization as a competitive advantage? But before we get there, we will need to gain an understanding of information security and compliance

Read More
Information Security
|
December 11, 2023

What is InfoSec: The 5 W’s of Information Security

When we describe what we do at Secure Shield almost every time the reply is “so, you mean cybersecurity?” Well, Kind of

Information Security can be confusing to some people. Okay, maybe most people. What is infosec, and why is information security confusing? Well, apart from being compared to “Cyber Security”, maybe it’s because we miss some of the basics. Understanding information security comes from gathering perspective on the five W’s of security: what, why, who, when, and where.

Read More
Information Security
|
November 16, 2023

What Drives Us Crazy: The Blinky Lights Syndrome

When Secure IT Systems decided to move away from the MSP space to focus solely on Information Security, it was to help try to fix a broken information security industry. One of the ways it’s broken is that there are many people and vendors participating in the money grab, trying to sell you potentially ineffective cyber security technology solutions. We call these blinky lights or better known as “The Blinky Lights Syndrome”: high-tech products or services that falsely claim they’ll fix everything for you automatically.

Read More
Information Security
|
November 2, 2023

Simplify with Cyber Security Fundamentals

One of the biggest, most consistent traps I’ve seen organizations fall into is making security overly complicated. It’s understandable—security as an industry is still relatively new and most of us feel like we are making the rules up as we go. And one of the cruxes of not understanding cyber security fundamentals is to make it more complex than it needs to be.

Read More