View Post

Cyber Wednesday Info Byte #19

Did you know that scientists are currently studying the factors that make users click on a phishing email? Our friends at NIST have developed the Phish Scale by studying the behavior of 5000 users to identify cues that help someone spot a malicious email. The fewer cues there are the more effective the phish is. “As organizations continue to invest …

View Post

Cyber Wednesday Info Byte #18

The NIST Cyber Security Framework provides a framework for managing cybersecurity risk through applying industry best practices, but it is not one-size-fits-all. The framework must be tailored to specific mission critical goals of each organization. NIST IR 8183 R1 “Manufacturing Profile” is a road map for manufacturers to apply the framework. “The Manufacturing Profile is meant to enhance but not …

View Post

Cyber Wednesday Info Byte #17

As your organization develops defensive cyber security capabilities it may become necessary to hire additional employees or outsource tasks to a trusted partner. The Workforce Framework for Cybersecurity (NICE Framework), NIST Special Publication 800-181, provides a lexicon of security Knowledge, Skills, and Abilities (KSAs) that these cybersecurity roles require. “Cybersecurity is a rapidly changing and expanding field. This expansion requires …

View Post

Cyber Wednesday Info Byte #16

Cybersecurity Risk Management (CSRM) can and should be integrated into your existing Enterprise Risk Management (ERM) framework. NIST recently published NISTIR 8286 as a guide to help enterprises of any maturity level input cybersecurity risk data into the decision making process. “Cybersecurity risk measurement has been extensively researched for decades. As measurement techniques have evolved, the complexity of digital assets …

View Post

Cyber Wednesday Info Byte #15

It’s #CybersecurityAwarenessMonth ! With many employees still working from home, it’s more important than ever to make sure that you are staying safe both in your personal online activities and your professional endeavors. The folks at National Cybersecurity Center of Excellence (NCCoE) have put together an excellent list of cyber security basics for telework. “Don’t panic. There are some simple …

View Post

SDM: PSB Exero Offers Cloud-Based Intelligence & Asset Management

We are proud to announce that PSB EXERO was recently featured in SDM Magazine. PSB Exero is a monitoring platform that is compatible with all networked devices. Its powerful and user-friendly dashboard provides insight into device and network performance, and when a networked device goes down, Exero knows immediately, so it can be fixed immediately. The platform even provides foresight …

View Post

Cyber Wednesday Info Byte #14

Cyber criminals continue to profit from ransomware. The Cybersecurity & Infrastructure Security Agency has released a comprehensive guide of best practices to avoid becoming the next victim of an attack. These best practices are your first defense against this threat. Malicious actors have adjusted their ransomware tactics over time to include pressuring victims for payment by threatening to release stolen …

View Post

Cyber Wednesday Info Byte #13

The National Institute of Standards and Technology has released a major update to Security and Privacy Controls for Information Systems and Organizations SP 800-53. The first major update in seven years, revision 5 includes a new Supply Chain Risk Management (SCRM) control family (SR). SP 800-53 continues to be a cornerstone tome of effective cybersecurity policy and practice. This publication …

View Post

Exero on the job!

Exero keeps another customer client informed – the monitoring platform for all your IP devices! Over the weekend, Unlimited Technology’s (UT) Fusion Center received packet loss warnings at 7am from multiple panels and recorders at a client site from the Exero monitoring platform.  The client was contacted to see if there were power or network issues going on in the …

View Post

Cyber Wednesday Info Byte #12

Every day our personal information and metadata is flowing through an increasingly complex data processing ecosystem. Organizations and consumers alike have a need to understand the potential privacy risks associated with the technological solutions they choose. The Privacy Framework provides a common language for understanding, managing, and communicating privacy risk with internal and external stakeholders. It is adaptable to any …