Cybersecurity Foundations

By Jason Bovee on Mar 14, 2018 10:09:45 AM

There has been a tendency in recent years to mistake a strong cyber-security posture with the use of information technology security tools and services available in the industry. In this webinar with the Colorado Statewide Internet Portal Authority (SIPA), we examine the foundational pillars of IT security, including an overview of the threat landscape, the establishment of useful policies, and the teams responsible for upholding them. From there, we identify the most successful strategies and their complementary services to ensure a balanced, value-centric approach to effective cyber-security. Check out the full webinar recording below!

Continue Reading

5 Security Trends to Keep Top of Mind in 2018

By James Mathis on Feb 1, 2018 9:04:27 AM

1. Security Awareness

Security awareness may be the single most important thing you can do to protect your employees and your organization. In 2017, 90% of security attacks where phishing attacks. This points to the fact that your employees can become your biggest tool in preventing future cyber attacks. Security Awareness training should be mandatory at your organization, this not only helps keep your business safe, it will keep your employees safer at home. Come up with a way to make the Security Awareness training fun and steer clear of self-paced video or ”death by powerpoint” and cover topics that can be utilized outside of work as well:

Continue Reading

5 Cybersecurity Recommendations for Government Entities and State Municipalities

By James Mathis on Sep 28, 2017 9:23:00 AM

A recent article by SecurityWeek confirms reports that the U.S. state and federal government's cybersecurity standing is ranked 16th out of 18 industry sectors. Commenting on the report, Sam Kassoumeh, COO and co-founder at SecurityScorecard, said, "On an almost daily basis, the institutions that underpin the nation's election system, military, finances, emergency response, transportation, and many more, are under constant attack from nation-states, criminal organizations, and hacktivists. Government agencies provide mission-critical services that, until they are compromised, most people take for granted." It is very concerning that these critical public sector organizations are some of the most vulnerable to cybersecurity attack.

Istonish is proud to work with the Colorado Statewide Internet Portal Authority (SIPA) to provide Managed IT Services and Security Assessments to Government Entities and State Municipalities. Based on 21 NIST industry standards (grading for impact and urgency), Istonish has created an assessment that not only yields a “point in time” appraisal of the current security profile of the organization, but also a detailed and prioritized list of remediation recommendations. 

Continue Reading

To Beat a Hacker, Think Like One: Using the Cyber Kill Chain to Fight Cyberattacks

By James Mathis on Jun 22, 2017 2:41:53 PM

As hackers become more inventive and sophisticated, organizations must up the ante with better cybersecurity. Unfortunately, most cybersecurity still focuses on preventing cyberattacks. 

Continue Reading

Nine Indicators of Compromise a Cyber Threat Assessment Will Help You Uncover

By James Mathis on Jun 13, 2017 11:09:18 AM

Your network has probably been breached. You just don’t know it yet. That is the nature of cyber attacks, many of which lie dormant and undiscovered for far too long. In 2016, Verizon published in its Data Breach Investigations Report (DBIR) that a whopping 83% of compromises took weeks or longer to discover.

Continue Reading

Lists by Topic

see all

Posts by Topic

see all

Recent Posts