2023 State Data Privacy Laws Overview

2022 was a big year for data privacy in the U.S., with many states passing or considering data privacy legislation and the American Data Privacy and Protection Act (ADPPA) nearly passing both chambers of Congress. Had it been successfully passed, it would have been the U.S.’s first national data privacy act, superseding the many state-level provisions. With 2022 in the rearview mirror, it’s time to look ahead to what awaits us for data privacy in 2023.  Five new laws at the state level are coming into effect this year, including CPRA that will supersede CCPA. Over the coming days, we’ll take a look at each one and review how they affect the data privacy landscape.

Many of the core tenets are shared by each state-level data privacy law coming into effect in 2023 and also should be comparable to the European Union’s General Data Protection Regulation (GDPR) in many regards. Though the language varies from statute to statute, each law requires certain consumer rights regarding data privacy to be honored by businesses and data controllers in these states. These rights include the right to access their personal data, the right to correct inaccuracies in their personal data (excluding the Utah Consumer Privacy Act), the right to delete their personal data, the right to a copy of their data, the right to opt-out of the sale of their personal data, and the right to opt-out of targeted advertising. 

Additionally, data controllers subject to these statutes will be required to provide consumers a privacy notice detailing how they handle personal data. In all of the 2023 laws, UCPA data controllers will be required to detail their data retention schedules along with their purpose for retaining such data. All of the 2023 data privacy statutes will also require data controllers to implement and maintain reasonable security controls to protect consumers personal data. Again, these will vary from statute to statute, but their inclusion will help to protect consumers’ sensitive personal data.

Our 2023 State Data Privacy Laws series will look at the requirements in each statute,  along with how each statute varies from another. The similar, familiar core to these data privacy laws should make general compliance manageable. However, there are some tedious edge cases that will only get more complicated as new data privacy laws pass across the nation. Sooner or later, there will be a need for a simplified nation-wide data privacy law like we almost saw passed in 2022. While we don’t know whether 2023 will build on what the ADPPA started, states certainly won’t wait for Congress to act on data privacy.

read more

Why Ongoing Audits are Good for Business

If you browse cybersecurity literature long enough you’ll find the benefits a business can derive from a privacy or security audit are generally well understood and regarded, but lesser-known are the perks of ongoing audits. This is largely due to a generalized concern some businesses hold that subsequent audits may be redundant – which is a prudent question of cost-efficiency. What’s often misunderstood in this concern is that the benefits of continual audits are at the same time greater and different than those of singular audits, with the difference being seen largely in the distinction between proactive and reactive action. Let’s take a quick dive into this distinction, and discuss a few key benefits continuous audits will bring.

A simple way of highlighting the key point of utility of continual audits is by considering the audits like you might consider a medical check-up – after all, an audit essentially is a health check for your information security system, so this makes for an apples-to-apples analogue. If you’re feeling very sick you might well schedule a one-off check-up. From there a doctor will run tests, make a diagnosis, and create a treatment plan to get you back into good shape. This check-up is generally the role an isolated audit will perform, and it definitely is a step in the right direction. But it’s worth remembering that if routine re-visits aren’t made then afterward you’re liable to miss otherwise detectable signs of illness and become sick again. And although it’s true that you can schedule another appointment at that point, the fact you’re sick to begin with is damaging to the body, and the recovery process can be drawn-out, challenging, and expensive. It’s oftentimes a lot more efficient for both your health and wallet to mitigate the risk of sickness consistently by making check-ups a routine, which represents the emergent perks of continual audits. 

It’s likely you can see how this same concept applies with information security audits – the best way by far to handle incidents is to take measures to avoid them entirely, and these measures are directed by continual audits. With that in mind, let’s look at a few specifics of how exactly these ongoing audits keep your business healthier than ad hoc audits:

  • Layered Net: A single audit might not always detect all risks present – some issues only become apparent in trends between multiple audits. A continual audit process ensures that most every detectable risk present in a system is identified, not just those apparent at a single point in time.
  • Remediation Review: Following the conclusion of an audit should come the process of addressing the identified risks. A common issue with said process is that the remediation efforts are not always fully effective, leaving the organization exposed still to a risk they believe is mitigated. Subsequent audits will review remediation efforts to assess their efficacy and provide guidance on how to improve them. 
  • Currency & Compliance: More frequent audits mean less room exists in-between for organizations to unknowingly diverge from emerging regulations and best practices. This not only simplifies the maintenance of compliance by way of lending more time to react to and prepare for new requirements, but also lends a competitive edge by allowing for quick adoption of new security and privacy best practices. 
  • More Recent, More Value: Over time your organization and the risk landscape it’s exposed to changes, and thus audits lose relevance with time. This makes recency a large variable in the value an audit brings, both internally and externally. For instance, externally it’s often found that potential partners or clients only accept audits from the last year or six months, with more recency generally preferred. Internally, timely findings in developing systems are oftentimes extremely beneficial, as it’s far easier to adjust for security early in that system’s implementation than attempting to retrofit it far afterward.

Altogether, the benefits listed above are most apparent in (if not exclusive to) a continuous audit process. And these points don’t even account for the human benefits of the process, such as improving staff’s understanding of your organization’s risk posture over time or demonstrating your organization’s commitment to cybersecurity and data privacy to prospects. It’s worth remembering that security and privacy are not problems to fix, but an ongoing process of improvement – in that sense, with audits an increase in quantity often boosts the quality of the process altogether.

Is your business interested in the benefits of a new audit? Whether you’re looking to establish an audit process or conduct your first audit ever, CyberData Pros are experts in the process and can walk you through it – from scoping to a polished report. Contact us now for a free consultation and to learn more about our services.

read more

Your IT Department is NOT your Cybersecurity Team

So, you’ve got yourself a head of IT and they can do it all! You hired the best of the best. They can manage your cloud infrastructure, setup and administer all your company laptops, secure your wired and wireless networks, and even figured out a way to get that ancient printer/copier onto the network for everyone to use. The corporate space has long heralded the prodigious “IT Person’ as the crown jewel of all things computer and technology. However, as technology has advanced, companies have started leveraging more and more of these incredible advancements. From fully cloud-based infrastructure and virtualization to advanced digital communications and collaboration tools, the venerable ‘IT Person’ has never had a plate so full. On top of all that, many of these companies have made the frankly naïve and ultimately costly mistake of handing cybersecurity responsibilities to that very same ‘IT Person’. 

Anyone in the cybersecurity space will tell you the same thing: cybersecurity may be IT, but IT is NOT necessarily cybersecurity. Having someone( or better yet a team of people) with specialized knowledge and focus is absolutely vital to survival in the sea of never-ending cyber threats. One of the best places to start is with a Security Engineer. The job of a Security Engineer is to be able to understand the organization as a whole, including its culture, technology, data assets and liabilities, and leverage that understanding to deeply integrate low friction, seamless security controls around information systems within the organization’s existing structure. The key here is the deep integration, and low friction. A proper engineer is able to provide what your ‘IT Person’ just doesn’t have the specialized skills to deliver. Anyone can set astronomically high password requirements, turn off permissions for important systems unless requested, and set up a messy and slow VPN connection that employees are required to use. But all of those things are perfect examples of high friction systems that lead to constant pushback from employees, and constant holes to plug as people find a way around these frustrating restrictions. A Security Engineer has the skills necessary to build systems that work WITH your organization and its structure to make your workflows more secure, while remaining as low friction as possible. This big picture approach will ultimately lead to better buy-in from employees, which in turn leads to dramatically more secure infrastructure. 

While a Security Engineer is a strong and effective role to fill, it is undoubtedly aspirational for most smaller organizations. It would be entirely unrealistic to say every company has a need or the resources to house an expensive employee focused solely on security. So what about everyone else? Enter the IT Security Specialist. You could reasonably think of this role as something along the lines of a Jr. Security Engineer. This is a role that strives to achieve many of the same goals as a Security Engineer, but perhaps with a few years less experience, and a few less certifications under their belt. However, there is one thing the IT Security Specialist has that makes it a fantastic role for most companies to start with: hands-on IT experience. The IT Security Specialist is designed to work side-by-side with your existing IT operations. By bringing specialized, security focused insights and strategies, as well as the ability to implement those strategies, you’re able to alleviate additional burden on the already famously thin-stretched IT department. This should bring a ‘security first’ mindset into the organization.

So we’ve covered the entry points of small and medium organizations, but say you’ve just signed a handful of your biggest clients yet, and have major expansions planned over the next few years. An IT Security Specialist isn’t going to cut it, and a Security Engineer or two seems nice, but some of these big partnerships have some massive security requirements, including high level management focused on protecting their data. What are you supposed to do? This is exactly where a CISO, or a Chief Information Security Officer, is designed to fit in. Most simply described as the head of all things security, you are committing to establishing an entire division of your organization to the quality, strength, and importance of data privacy and security. A CISO can report directly to the CEO, or to a separate CIO (Chief Information Officer); however, comparing the two roles is an entire conversation in and of itself. From developing and managing security programs like company wide training to implementing network monitoring systems and incident response teams, a CISO is the one responsible for making all these things happen without burdening the CEO or other key areas of the organization. This is a great way to show potential clients, partners, or even investors that you are deeply committed to your organization’s security infrastructure. This shows that they can trust you to take every precaution necessary to protect their data, as well as brand reputation from the devastating consequences of a data breach.

While there is no one-size-fits-all solution to cybersecurity infrastructure, one thing is abundantly clear for organizations of all sizes: your magical, wonderful, and altogether impressive ‘IT Person’ should not shoulder the burden of your cybersecurity infrastructure. With the incredible complexity in which modern organizations operate such as remote cloud infrastructure, nested virtualized networking, and fully digital, internet connected communication and data storage systems, IT has enough on their hands as it is. Specialization is what today’s cybersecurity programs demand. With a seemingly endless stream of new threats and the escalating consequences they bring with them, falling behind is not an option.

Is your business looking for a certified partner to assist your “IT Department”? CyberData Pros has many years of experience in IT, data privacy, and cybersecurity to make sure your business is secure. Contact us now for a free consultation and to learn more about our services.

read more

The Best Defense is a Good Offense

Within the realm of cybersecurity, there are a multitude of steps your organization can take to help better secure your infrastructure, network, and applications. While it might sound easy to go with an out-of-sight, out-of-mind approach, a particularly important component of a strong security posture involves digging to uncover weaknesses before they become a real security incident. Oftentimes discerning what these various tests, scans, and reports are in the first place can leave one confusingly scratching their head, let alone recognizing which option might be best suited for your business. Two of the more common techniques that often get lumped together are penetration testing and vulnerability scanning, but while there can be some overlap, it’s important to distinguish and understand the differences between the two. 

Both penetration testing and vulnerability scanning can be beneficial to an organization in their own way. Depending on a multitude of factors and circumstances, one might be chosen over the other, i.e. if there are budget limitations, or perhaps one is required by a standard, regulation, or contractual agreement. While on their own both options carry great value, the strongest results come from a combination of the two as both methodologies complement each other to form a comprehensive approach. To briefly define, vulnerability scanning is a process that uses automated tools to search for and identify known vulnerabilities across an organization’s devices, systems, and networks. Penetration testing, often referred to as ethical hacking, takes a more manual approach by attempting to actively exploit any weaknesses that exist, in order to simulate what damage could be done by a real attacker. 

Aside from the core definition, there are benefits and comparisons between the two that are important to discuss when you are considering implementing either or both options. When a vulnerability scan is completed, the results are generated into a report that identifies, categorizes, and scores each found vulnerability. Since there is no attempt to actively exploit, the purpose here is primarily informative. It requires manual analysis to sift through the false positives and carry out the remediation steps to mitigate the risks associated with the findings, prioritizing  the most critical findings first. Vulnerability scans are performed more frequently than penetration tests (ideally quarterly) and are useful to compare to previous scans to monitor progress. Due to their more lightweight nature, vulnerability scans are much quicker and cost-friendly than penetration tests. 

By contrast, as the goal of a penetration test is to think like the “bad guys”, they are significantly more detailed and thus require substantially more time and effort. Because of the thorough and in-depth nature, a penetration test takes days to weeks to complete. Naturally, the cost associated with a penetration test is higher than a vulnerability scan, but it’s worth noting that a retest is frequently included in the cost. Additionally, they do not need to be conducted as frequently as vulnerability scanning; annually is the most common interval. 

Pages could be written diving into the details of each, but the aim here is to give you a short synopsis and explanation of these often confused terms, and hopefully by doing so allow you to have a better understanding of the real world applications of each. Each carries its own value, but the best approach combines the advantages of both to take your company’s security strategy to the next level. 

Here at CyberData Pros, our team is proud to offer these services to our clients, and we encourage you to contact us to discuss how vulnerability scanning and penetration testing can help your ability to strengthen your company’s security. The best defense is a good offense.

read more

Simplifying Remote Security with Mobile Device Management (MDM)

For all its believers and detractors, the remote workforce appears to be here to stay. The most recent McKinsey American Opportunity Survey indicates that 58 percent of Americans report having the opportunity to work remotely at least once a week, and that of those offered remote-flexibility 87 percent will take it. To many, this may be no surprise – remote work offers a variety of conveniences – but this shift of environment does, inevitably, open up new risks and roadblocks. During the 2020 pandemic many organizations accepted these risks as a temporary measure, but as this industry trend appears to be solidifying into a permanent shift, a more permanent solution should be considered to reinforce this new, broader attack surface. One tool that’s stellar for this application is a Mobile Device Management solution.

A Mobile Device Management solution (or MDM) is a package of software that aims to allow for centralized management of mobile devices (like cell phones, laptops, or other devices that move) in what is inherently a decentralized environment. The value of this capability is higher than ever before, as previously many endpoints were static, being used exclusively in a controlled network within a controlled location allowing for simplified administration, configuration, and security. MDM provides a means to reclaim these benefits by establishing a connection from the device, or client, to the MDM server, through which said devices may be remotely monitored and managed. If this description of MDM capabilities sounds broad, that’s because its utility truly is. Here are some specifics to explain how the right MDM solution can simplify the organization, boost the security, and ultimately reduce the expenses of your remote workforce.

Simplify Organization

One notoriously tricky aspect of remote workforce management is accounting for the statuses of company devices in an environment where IT personnel don’t have direct access to them. This can make processes like maintaining hardware/software inventory and pushing new software or updates challenging. A MDM solution can make these organizational tasks a cinch – the devices registered within it can be centrally viewed and audited for their status, assigned user, and software versions amongst other factors. In the event an update needs to be pushed to many devices the MDM can be used to easily select the devices to update along with a scheduled time for it. These features come together to make the maintenance and standardization of remote devices exponentially more efficient, and thus also help keep IT infrastructure scalable.

Bolster Security

Delving more into the benefits of simplified auditing and standardization of MDM reveals the impressive extent to which it improves remote security. A chain is only as strong as its weakest link, and so an organization can have a painstakingly manicured security policy and exhaustive controls but still be highly vulnerable if these security measures are not enforced universally. MDM provides a means to ensure that all devices connected are abiding by a defined secure configuration (think firewall settings, VPNs, and enforced encryption) with the capability to adjust said configuration en-masse, leaving no room for weak links to slip by unnoticed. 

An additional concern with remote work is that with the lack of a controlled environment comes an increased risk of device loss or theft. To compensate for this an MDM offers capability for GPS tracking on devices to boost odds of recovery, as well as capability for a remote-lock and data wipe in the event recovery is not possible. The deletion of data in these circumstances is of small consequence thanks to another common feature of MDM – automated data backups, with capability of easy device restorations. These features as a package make MDM a highly valuable component of a remote security posture, and as such are commonly recommended for compliance as well as in remediating risk assessment findings.

Reduce Expenses

Understanding that implementing MDM represents an investment in the IT infrastructure of an organization, an all-important point to address is how that investment recoups its cost. To this end MDM can provide value in a number of ways, but two categories stand out as the most significant:

One major source of value MDM generates is present in the sheer reduction of time costs its proper use entails. The fact that MDM streamlines the organization and standardization of the remote workforce means that IT personnel can far more efficiently identify, troubleshoot, and remediate issues, notably with an increased ability to do so remotely. This saves not only the premium-priced time of IT staff but also reduces downtime for non-technical staff, as devices won’t require as much time to be fixed or shipped. Even in the event of a device requiring replacement MDM confers time savings through its considerable increase in deployment speed, made possible through automated configuration and restoration of data backups. This decrease in downtime leads to an increase in productivity, and this benefit only scales upward with your organization.

The second and possibly more significant way MDM generates value is through cost avoidance, specifically through its ability to mitigate information security risks. It’s widely reported just how cripplingly expensive a data breach can be for businesses of any size, and with mobile devices containing sensitive data these breaches can oftentimes be no more than a security misconfiguration or phone swipe away. MDM can help mitigate this risk through the enhanced security baselining, monitoring, and remote remediation capabilities it brings. Even one prevented breach can justify an MDM’s cost multiple times over – not to mention the near-priceless benefits of sparing your brand’s image and reputation.

Considering the value proposition MDM brings to the table it becomes clear why these solutions are so attractive to remote workforces. The adoption numbers back this up – MDM market growth is growing quickly alongside remote workforce/Bring Your Own Device (BYOD) utilization, with a MarketsandMarkets report forecasting the MDM market to quadruple its current size to $20.4 billion by 2026. As with any investment the purchase of an MDM tool warrants thoughtful consideration – but for the value it brings, it’s a consideration most any remote workforce should be making.

Need help securing your remote environment? Let CyberData Pros perform a risk assessment and walk you through the process of finding a solution that fits your posture. Contact us now for a free consultation and to learn more about our services.

read more

Zero Trust – What Is It and Should You Care?

Zero Trust is a term that gets thrown around a lot, but what does it actually mean? Zero Trust is a security framework that at a macro level is as simple as the name suggests; you “never trust, always verify” – meaning no user or application is trusted by default. Identity must be verified continuously for access to any of an organization’s assets. What this fundamentally means is that you can’t assume that users or applications inside your network are who they say they are. This has become more relevant as the traditional network perimeter has been replaced increasingly by cloud environments and employees in work from home (WFH) environments. There are numerous ways a Zero Trust architecture can add value to an organization’s data and security infrastructure, especially considering one of its core pillars is focusing on proper policy execution and implementation.

With the rise of decentralized workforces, and less defined network perimeters, there is an evolving need to change how we think about defense in depth. No longer is it sufficient to think about firewalls, and DMZs, and that’s where trust-based security comes into play. Identity, and its continuous verification become the new perimeter. In an ideal environment, even if an attacker is able to breach the network, they should find themselves relatively limited in their access as each account, application, and user require continuous verification. If a remote worker’s account is compromised, the breach should be limited to only their account and the attacker should find limited usable data while struggling to move laterally through the network to get a more advantageous foothold. A similar result can be achieved through operational excellence in implementing least privilege and user access controls. Least privilege is the concept that a user account, application, or process should only have those privileges that are essential for its intended function and nothing more. Access controls are intended to verify a user’s identity and to limit access of resources and information to only those users, applications, and processes which are authorized. While there are many tools out there that can help you achieve Zero Trust, the principles are rooted in controls you should already be practicing like the principle of least privilege and user access controls. 

While some enterprise level organizations may apply complex behavioral data and analysis run through Security Information and Event Managers (SIEMs) to enhance and build out their trust-based security posture, any organization can create a reliable trust-based security posture with the right policies and buy-in. To achieve this, you’ll need to be applying the principle of least privilege, implementing access control systems, and regularly reviewing these permissions and policies. You’ll also likely need to employ a Mobile Device Management (MDM) tool to ensure that all devices are in compliance with your trust-based security posture. Failure to enforce other basic security practices such as maintaining encryption when data is at rest, could jeopardize the effectiveness of your trust-based security posture. It is always a good idea to routinely perform internal security audits to identify any additional shortcomings in your security posture and practices.

Still confused? CyberData Pros can work with your team on an internal audit and data mapping exercise to help you better understand your company’s posture. We will then classify your data and help you put together an action plan. Contact us now for a free consultation and to learn more about our services.

read more

Risk Controls: What Are They and Do You Have Them?

So what are Risk Controls? Put simply, they’re a defined set of proactive steps or strategies that entities use to address risks to their business. These risks can include anything from technical and compliance concerns like data privacy and cybersecurity all the way to natural disasters and financial losses. These controls are an integral part of the larger risk management process that all businesses have to consider. While this process as a whole encompasses the identification, evaluation, prioritization, and remediation of risks, these controls serve as the answer to that all-important question at the end of the day; How do we fix it? Let’s take a look at the 5 typical classifications of risk controls- Remediation, Avoidance, Transference, Mitigation, and Acceptance- to see exactly how they answer that question, and how you might be able to use them within your own organization. 

Starting off, we have Remediation. This is a control that, when implemented, eliminates most if not all of an identified risk. This is a great strategy to adopt in instances like a software vulnerability where a patch or update can be applied. It’s quick, effective, and inexpensive to implement. While remediation may seem like an obvious strategy for a number of risks, there can often be a number of factors that prevent it from being a viable solution. Another control, Avoidance, can be a great way to fill some of those gaps. Rather than saying, ‘If there is an issue, we will fix it”, the concept of Risk Avoidance focuses on eliminating non-critical systems or processes entirely, preventing the proliferation of risk before it can occur at all. This strategy can offer some fantastic benefits like cost savings and reduced organizational complexity, but like remediation it’s no catch-all solution. There are plenty of risks that are simply inherent to the core of many businesses and are thus inevitable. So what can we do about it?

Mitigation, also referred to as Reduction, is a great strategy to apply in situations with inherent risk, as it seeks to lessen the likelihood of the risk being exploited. This type of control is typically most viable in unavoidable situations where there are steps that can be taken that will greatly diminish the risk but none that can remediate it completely. Scenarios like this often occur when there are known vulnerabilities within critical systems that are too important to be removed, so an organization tries to lessen the likelihood of that risk being realized through additional controls such as firewalls or antivirus software.

So what if you’re a small business and these strategies are too expensive or complex for your organization to implement with its limited resources? Well, Transference could be just the thing for you. This control essentially passes risks to a third party, like a service vendor or insurance company. By utilizing vendors for high-risk business functions, like servers and physical security, an organization can push the assessed risk to the vendor to manage. In the case of insurance, transferring risks materializes with the recovery of the costs associated with them, should an incident occur. 

Now, let’s face it; in the real world, there just isn’t always a simple, easy, or inexpensive solution for everything. In these cases, Acceptance is a risk control that doesn’t try to reduce the risk at all. Rather, Acceptance takes the cost and complexities of the other risk controls and weighs that against the costs and consequences of the risk itself. If the cost and complexity of controlling the risk outweigh that of the risk itself being realized, the most pertinent control may be to simply accept the risk as it stands. Typically, this option is only considered when the consequences of the risk are relatively low. For example, Acceptance would not be a viable strategy for business critical systems. Understanding the differences in these situations and how to apply the proper control is critical to effective risk management and governance. The modern business landscape is ever changing, which is why risk management should be a continuous, evolving part of an organization’s infrastructure. By continuously monitoring and assessing new and even previously identified risks and controls, you can rest easy knowing that your organization is managing its risks to the best of its ability.

CyberData Pros can run a risk assessment to determine your company’s risks. We will then classify them and help you put together an action plan. Contact us now for a free consultation and to learn more about our services.

read more

Proactivity Pays – Why Wait for Clients to Request ISO 27001 or SOC 2?

In a rapidly evolving digital world, the bar for an effective security posture seems to keep rising higher and higher. New threats are emerging constantly, and new policies and controls are required to keep them at bay. Secure practices are unfailingly an expectation of clients and authorities alike, but maintaining them is growing increasingly difficult. Already there are so many best practices to abide by that the task of organizing and accounting for them alone becomes overwhelming. Given these considerations, it’s no surprise that businesses around the world are increasingly looking toward implementing security frameworks like ISO 27001 and SOC 2. 

Not only do these standards provide organizations a guide to forming a current and robust information security system and controls, but the attestations they provide can be a tremendous asset for attracting business. There’s no need to wait for a client’s prompting – by jumping on these frameworks early, you maximize the benefits you can reap from them. Here’s a look at the industry’s most recognized frameworks, and what implementing them can do for your organization right now.

ISO 27001

When speaking about any sort of business standards internationally, ISO is a name you’ll see often. Its parent organization is the International Organization for Standardization, and 27001 is their standard for Information Security Management Systems. It outlines a thorough set of criteria an organization should meet when constructing and refining a water-tight security framework, and a certification can be received affirming this after an audit. ISO 27001 certifications are coveted across the globe, with ISO’s latest survey showing a global 24.7% increase in certificates active over 2020 alone. If you’re looking to build or reinforce your ISMS and/or operate overseas and under GDPR, look to ISO 27001.


Narrowing the scope to North American operations, SOC 2 serves as a substantial boon for strengthening controls. Its parent organization is the American Institute of Certified Public Accountants, and SOC 2 is their method of validating the security of various business controls under five major Trust Services: Confidentiality, Processing Integrity, Availability, Privacy, and Security. Of these criteria, only Security is mandatory when filing for attestation, leaving this process flexible and more form-fitting, giving users room to choose which controls to demonstrate compliance in. If you’re wishing to reinforce your operational business controls and prove your compliance in your industry, consider SOC 2.

What Compliance Can Do for You

With a better understanding of what these frameworks are, you might be left to wonder what pursuing one might do for your business. Compliance is great, but why not just wait until someone asks for it? Well, for starters, you may well be too late at that point. From preparation to attestation, SOC 2 typically takes over three months and ISO 27001 often takes north of nine months to a year to attain. Past that, simply preparing for and holding these frameworks generates value for your business in a myriad of ways. Here are some to consider:

  • Attract clients with well-regarded attestations, stand out from competitors and win more business.
  • Bolster your security posture to exacting modern standards, reducing your risk of costly incidents, fines, and breaches.
  • Create an efficient information security structure that streamlines workflows and can scale with your growth.
  • Demonstrate a consciousness toward data privacy and security, boosting your organization’s reputation.

The benefits outlined above can be seen not just after receiving attestation for the standards, but begin to form as soon as progress towards the criteria begins. Building and refining better frameworks and controls is a gradual process, but you will undoubtedly benefit from the improvements made along the way. By beginning your ISO 27001 or SOC 2 process now, you will not only find yourself far better equipped to withstand threats to your business, but more attractive to prospective partners and clients.

Let CyberData Pros help you understand where your data sits, access control, and how to protect that data. Contact us now for a free consultation and to learn more about our services.

read more

DLP Rules – What Are They and Why You Need Them

In the business world of today, a data breach can cause damage of all kinds to a company. The repercussions of such an incident can include loss of customers and clients, damage to the brand and reputation, and of course, major financial losses. While it is impossible to completely eliminate risk altogether, there are many tools available that can be used to help decrease it. One such tool is what is known as Data Loss Prevention, or DLP. By implementing a DLP product(s), your organization can be sure it is taking a vital step towards protecting its data.

Before explaining how DLP technologies work, let’s first run through a few of the reasons why an organization would need DLP and explore what exactly DLP is. Data breaches have become commonplace in the news media, but generally these stories tend to focus on external attacks from criminals or governments. However, a data breach can (and does!) occur as a result of an insider threat too, even in cases where it is unintentional. These insider threats, along with an increase in sensitive data such as intangible assets and more compliance regulations to contend with, require a modern solution that organizations can leverage to protect themselves. DLP addresses all of these concerns.

DLP refers to a set of software tools and processes which work to ensure that sensitive or critical information is not lost, misused, or accessed without authorization. After data is prioritized and classified by an organization, DLP rules are set up that can monitor and control the intended or unintended sharing of data. If one of these rules is violated, then the DLP software will jump in to remediate the issue through protective actions such as alerts, permission denials, encryption, etc. For example, if an employee were to try to send an email containing a 16-digit credit card number, a DLP rule could detect that potentially sensitive information is attempting to be shared and then might notify the sender with a warning, alert the security team, or even prevent the email from being sent altogether. 

There are a variety of DLP deployment solutions that work to protect data at rest, in motion, and in use. Examples of the primary architectures are email, endpoint, network, discovery, and cloud DLP. Your organization may require the use of one, some, or all of these, so it is important to define your objectives and determine which are the most appropriate for your use case. In any case, DLP products work in two methods: contextual analysis, and content analysis based on string matches. Exploring the specifics of how these methodologies function can get quite technical and in-depth, so for now just realize that it involves things such as file checksum analysis and lexicon matches. 

In sum, as our world continues to collect and store ever-increasing amounts of data, it is more important than ever to take every step possible to minimize risk. Since total elimination of risk isn’t possible, making use of the tools available to help your organization be proactive in protecting its data should be a top priority. Don’t wait until it’s too late and the damage has already been done – take steps today to protect your data tomorrow. 

Let CyberData Pros help you understand where your data sits, access control, and how to protect that data. Contact us now for a free consultation and to learn more about our services.

read more

Risk Assessments: What Are They and Do I Need One

As businesses grow, both in size and organizational complexity, so should the scope of their privacy and security efforts. This is an important lesson which many companies have had to unfortunately learn the hard way. But who among us can honestly blame them? The cybersecurity landscape can be VERY complicated. Penetration testing, data encryption, password management, user access controls, firewalls, domain administration, cloud servers, international data and privacy laws; these are just a fraction of things you have to consider when you start looking at your security posture. Heck, these days even your printer could be considered a cybersecurity risk!

So where do you start? You know you have to do something, but finding a place to start in such a vast and overwhelming space can be a barrier in and of itself. More often than not, simply understanding what you have that is at risk, and the factors that are putting you at risk, are the best first steps to put your company on the right path. Luckily the industry has a solution for this very scenario. Enter the cybersecurity risk assessment.

A risk assessment is a fantastic tool that takes a broad, contextual look into the privacy and security of your business, which can be simplified into three major objectives. The first objective is identifying information assets that could be targets of, or affected by a security breach. By understanding what assets are at risk to begin with, you can more easily focus on plans and important objectives for protecting them. This can also help you understand more about your privacy and security needs in general. Do you really need that expensive IPS your IT manager asked for? Should you be looking at ISO 270001 certification? Risk assessments can help answer those questions for you.

After identifying your assets, the second objective is identifying the risks to, or associated with, those assets. In other words, what risks do those assets come with, and what aspects of your company infrastructure could be putting those assets at risk. This can range from very technical things like firewall misconfigurations, or vulnerable software running on company servers, to less technical things like unlocked doors, and misplaced camera systems. This is the part of the assessment where you can start to see the work that needs to be done, and you can start prioritizing findings by criticality. This will tell you what findings are important and must be remedied immediately, or what might be considered minor and worth accepting if there are more important gaps to remedy first.

Once you understand your risks, the last major objective is of course, remediation. Starting with the most critical findings, a risk assessment will assign responsibility for these risks within the organization, as well as goals and guidance for mitigating them. Sometimes referred to as a ‘Treatment Plan’, having clear and concise documentation of the issues at hand drastically reduces the time it can take to alleviate them. Assigning responsibility for these risks also creates a sense of ownership and accountability within the organization to ensure these are not only fixed quickly, but are maintained over time. 

While risk assessments are phenomenal for newer businesses just getting started on building their cybersecurity infrastructure, they are also incredibly important for established security teams as well. Regular risk assessments allow your company to track progress, quantify improvements made, and continue to identify new opportunities for improvement as you change and grow. This ensures that as new clients join, or new services are offered, you can maintain a comfortable footing within your risk management structure, as well as a potential competitive advantage over others in your space. As the data privacy and security requirements for the biggest companies in the world continues to grow, due diligence and proactive tactics that show your organization is committed to handling their data responsibly and securely can make all the difference when they are deciding who gets that next big contract.

Let CyberData Pros conduct a Risk Assessment for your business and help identify any data privacy/security gaps that may exist. Contact us now for a free consultation and to learn more about our services.

read more