Our Blogs – For CIOs by CIOs

Read our posts and join the conversation.

Ignore These 7 Key Cybersecurity Tactics at Your Peril

7 Key Cybersecurity TacticsBy Scott S. Smith
Security Practice Lead

Given the fact that many organizations experience near-continuous cyberattack attempts, if you have not already done so, getting a robust cybersecurity plan in place is a must. This plan needs to be tailored to address your organization’s business requirements, culture and risk tolerance around cybersecurity. It also will need to ensure compliance with applicable regulations and laws, and include plans for how to respond if, in spite of your best efforts, a security breach takes place. You don’t want to be in Equifax’s situation, where a hacker’s ability to exploit what was most likely a known weakness has now put millions of consumers’ identity and financial security at risk. The government, your customers and the general public are all losing their tolerance for disasters that happen when known problems are ignored.

Getting a Cybersecurity Plan in Place

Cybersecurity PlanBy Scott S. Smith
Security Practice Lead

Given the dramatically negative impact that a cybersecurity failure can have on your business, implementing a cybersecurity plan is mission critical. In my last article I talked about some of the business-driven needs that might drive your cybersecurity plan. Today I will address some of the steps you need to take to get a cybersecurity plan in place.

Understanding Why Your Business Needs Cybersecurity

Why Businesses Needs CybersecurityBy Scott S. Smith
Security Practice Lead

The recent data breach at Equifax is just one of the latest in a long string of high-profile cybersecurity failures. In this particular case, the Social Security numbers and other sensitive information of up to 143 million Americans were exposed. In another case, the NotPetya attack very quickly spread to, then severely hobbled operations in, corporations around the world, including the giant shipping company Maersk.

These and other recent cybersecurity failures in the news have resulted in intellectual property loss, disclosure of embarrassing communications, loss of business, massive public relations nightmares, and more. And that’s just for the high-profile cases!

Can Your Business Survive a One-Two Punch?

BCP for multiple problems at onceBy Stephen McGrady
Principal

If Hurricane Harvey and the magnitude 8.1 earthquake off the coast of Mexico didn’t get you thinking about whether your business is prepared to withstand a major disaster, chances are Hurricane Irma or Maria did.

Like most professionals who work in the Business Continuity Planning (BCP) field, I’ve been giving a lot of thought to the implications of having three major natural disasters strike in North America within a 1-1/2 week span. It’s become clear to me that even if you have what you thought was a solid plan in place to keep your business operating after a disaster, your plan might not be good enough. After all, most organizations put plans in place that address how they’ll recover from one disaster. Very few ever consider the possibility that the situation may be even worse than that.

What’s New & Frightening In the World of Ransomware & Business Continuity Planning

Ransomware & Business Continuity PlanningBy Stephen McGrady
Principal

Those responsible for Business Continuity Planning (BCP)—i.e. having plans in place to keep a business running after disaster strikes—understand that the world really can be a dangerous place. Although hacking, malware and ransomware aren’t really “new” threats per se, they have certainly grown in frequency and impact.

As some recent high-profile situations have shown, terrible things can and do happen to organizations everywhere. Case in point: Disney was recently hit with a ransom demand by hackers who claimed to have stolen the latest “Pirates of the Caribbean” movie. A few weeks before that, hackers stole the latest season of “Orange is the New Black” from Netflix, and leaked episodes when the firm refused to meet their ransom demands. And then there’s the widely-publicized “WannaCry” ransomware attack, which affected over 200,000 computers in 150 countries in May.

A 4-Step Approach to Business Continuity Planning

A 4 Step Approach to BCPBy Stephen McGrady
Principal

As I discussed in my article on the difference between Business Continuity Planning (BCP) and Disaster Recovery (DR) planning, Business Continuity Planning is about the operations side of disaster preparedness. How will you keep the business running after disaster strikes?

When helping organizations address their Business Continuity Planning needs, CIO Professional Services uses a four-step approach: conduct a Business Impact Assessment, get Governance mechanisms defined and approved, prepare the team to handle Crisis Management, and create the Emergency Operating Plans (EOPs) for highly-impacted departments. Here’s an overview of how this works…

Business Continuity Planning vs. Disaster Recovery Planning: What’s the Difference?

BCP vs DRBy Stephen McGrady
Principal

There’s nothing like the unthinkable happening to make businesses realize that the unthinkable really can and does happen. This was the case with the 9/11 attacks, which not only collapsed two towers, but also left a significant part of lower Manhattan closed for business for quite some time. By 9/12 the necessity of preparing for disasters was at the forefront of every executive’s mind.

That said, disaster preparation is a multi-faceted endeavor. The two biggest aspects are known as Disaster Recovery (DR) planning and Business Continuity Planning (BCP). The following is a high-level introduction to both…

Some Leading Practices in Identity and Access Management

Leading practices in identity and access managementBy Scott Smith
Security Practice Lead

Whether talking to people at large companies or small companies, when we bring up the topic of Identity and Access Management (IAM) we often hear a lot of the same comments…

  • “I am concerned that we have employees who have been here 10 years, and have access to everything, but I don’t know how to control that risk.”
  • “Of course we have password policies…but I’m not sure they’re being enforced.”
  • “I recently discovered an account for someone who left the company 14 months ago.”
  • “Half the people in our IT department have global permissions—they can access anything.”

An Introduction to Identity and Access Management

Intro to IAMBy Scott Smith
Security Practice Lead

Four years ago Target suffered a data breach that caught the attention of consumers and executives everywhere. By starting with a stolen dormant login from an HVAC contractor who was no longer working with Target, attackers were able to gain root access directly into Target’s data center. Once in, they found a web application vulnerability and managed to use this to steal the PII (personally identifiable information) for over 70,000 people, and seize the data for over 40 million credit and debit cards from a Point of Sale system that was not directly connected to the internet.

Are You Getting the Return on Your IT Investment that You Should?

IT Effectiveness AssessmentBy Jeff Richards
Managing Partner

Your company is growing. You know your organization needs to move fast, but in focusing on the business you may have underinvested in IT. Now IT has become such a constraint that you’re not sure your systems can keep up with the growth. On top of that, you’re concerned that IT and the lines of business may not even be on the same page.

Or perhaps the CIO thinks that IT is doing fine, but the rest of the management team doesn’t understand what they’re getting for their IT investment. There’s even a concern that IT is too expensive. To make matters worse, you’re in a situation where the CEO can’t “speak IT,” and the CIO can’t “speak business”...and a complete disconnect has ensued.

To get on track you need to quickly get your bearings and determine if you’re doing the right things, in the right order, and doing them well. An excellent way to do so is through an IT Effectiveness Assessment.

Image
30 Fastest Growing Companies to Watch 2024 Logo

(650) 575-9255

info@ciops.com

Contact Us Any Time

555 Bryant Street, Suite 339, Palo Alto, CA 94301
Image

Got An Idea? Lets Make It
Happen Today

Just Wanna Chat ? Just let Us Know When