Category: Information Security
-
“What to Do When You’re Hacked: A Plain-English Incident Response Guide”

Maybe someone just called you indicating that they received an email from you that seemed odd. Or, maybe your bank is indicating that you made a transaction that you know you didn’t make and your account’s balance is a little lower as a result. Or maybe your PC is indicating that your files are encrypted…
-
Vendor Security Questionnaire
Contact Information Company Name: _____________________________________________________________________ Respondent Name: _________________________________ Phone: _________________________ Respondent Business Email Address: ______________________________________________________ Respondent Title: ______________________________________________________________________ Incident Response Contact Name: _________________________________________________________ Incident Response Contact Title: ___________________________________________________________ Incident Response Contact Phone: _________________________________________________________ Incident Response Contact Email Address: ___________________________________________________ Basics & Email Security Yes No Yes No Yes No Yes No Yes No Yes No…
-
Book Review: InfoSec Strategies and Best Practices
I just finished reading InfoSec Strategies and Best Practices by Joseph MacMilan last week. I have to say that if you want one book to read on the Information Security field, this is a pretty good choice. Not only did the book go over some of the basics of information security like the CIA Triad…
-
Cybersecurity Frameworks
I just did a post about my experience with the GRC Masterclass that Dr. Gerald Auger created. It was a great class and I highly recommend taking the class. With this post though, I wanted to highlight some of the major frameworks and give a general overview (and honestly a nice set of links to…
