Cloud-based SIEM frees that one hand tied behind your back

onearmHave you ever been asked to fight the state boxing champion with one hand tied behind your back? Many security professionals face this scenario every day. For many companies with whom I talk, there isn’t a lack of IT talent when it comes to security–just a lack of hours in the day, computing resources and necessary headcount with specific expertise to change the culture from reactive to proactive and strategic risk management.

READ THE ENTIRE CLOUD BASED SIEM ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

A de-provisioning proverb: When a door closes, just make sure you don’t leave a window open

disgruntledA forensic analyst confirmed something that I long believed to be true. One of the greatest threats to an organization comes from within. Not everyone who exits a company leaves with a handshake and a gold watch. Often times there are hard feelings; that the employer wronged the former employee and that employee will exact a matter of revenge or feel justified to extract some sort of perceived compensation. Now this isn’t meant for you to look sideways at the person sitting in the next cubicle. However, access policies  needs to be a part of any company’s  internal risk assessment and security policy.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

MSPs must practice what they preach-especially with security

msp_practiceMSPs have a lot of responsibility for the IT assets of their clients. It is expected that MSPs will take certain precautions to safeguard client data and infrastructure. In this case, it’s not just the client and their sphere of access that touch the data, but oftentimes the employees/consultants/techs of the MSP themselves – and if their back door is open, the risk can be transferred to the client.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE