Having staked the next chapter of my career in the world of cyber security I am on a mission to make the world a better place and promote world peace, at least that was the explanation to my children. In reality, what I read and see on a daily basis is that companies don’t appear to be making it too difficult for outsiders and third parties to gain access to company and personal data.
US Federal agencies, large enterprises, or small-medium businesses: Do you need to make sure you adhere to the NIST Cybersecurity Framework and NIST 800-53? Save time and paperwork by utilizing Jazz Networks’ power search. The National Institute of Standards and Technology (NIST), a part of the U.S. Commerce Department, is responsible for developing and enabling information security standards and guidelines across federal agencies. NIST has published the NIST Framework for Improving Critical Infrastructure Cybersecurity (“Cybersecurity Framework”) and NIST Special Publication 800-53 (“NIST SP 800-53”).
By the time you finish reading this sentence, the average organization with 1000 employees will have generated more than 65,500 log events from all of the devices connected to their network.* This might be 65,500 login attempts, files deleted, or files that contain personally identifiable information (PII) copied to a USB device by an employee working without VPN on the road. With the EU general data protection regulation (GDPR) going into full effect this week, understanding the difference and interpreting the implications of each scenario quickly and efficiently is necessary in order to be compliant with Article 33.
Does your company require employees to sign non-compete or non-disclosure agreements? If not, have you considered making your employees sign one? Are you located in a state in which non-compete agreements are unlawful or hard to enforce? Have you ever been asked to sign a non-compete or non-disclosure agreement and felt reluctant to do so because you didn’t want to limit your future job prospects? Chances are you answered “yes” to one or more of the questions above because companies have a legitimate, keen interest in protecting the information that gives them a competitive edge.