AWS-Cloud-Security-Consulting.jpg

CYBER SECURITY CONSULTING SERVICE AWARDS AND RECOGNITIONS

CyberSecOp's comprehensive managed security services, cyber security consulting, professional services, and data protection technology are recognized as industry-leading threat detection and response solutions by major analyst firms, key media outlets, and others.

CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

CrowdStrike Incident: Shifting Boardroom and Government Cybersecurity Strategies

The recent CrowdStrike incident, which was triggered by a problematic update rather than a breach, has become a significant turning point for boardroom executives and government leaders. This incident has exposed vulnerabilities in current cybersecurity strategies and revealed how reliance on a few dominant suppliers can jeopardize national security. As a result, there has been a notable shift in how these leaders approach their cybersecurity measures.

The Vulnerability of Supply Chain Dependencies

The CrowdStrike incident highlighted a crucial vulnerability: many organizations, including government entities and large corporations, depend on the same cybersecurity products. This shared reliance means that an issue with one supplier can have far-reaching effects, potentially disrupting entire sectors or even national security. The problem is not just with the individual products but with the interconnected nature of the supply chain.

A Strategic Shift: Exploring Alternatives

In light of this realization, boardroom and government leaders are reevaluating their cybersecurity strategies. There is a growing emphasis on exploring alternatives to the widely-used products that contributed to the incident. The focus is now on less popular software solutions that offer comparable services with enhanced security features. This strategic shift aims to minimize the risk of widespread disruptions by diversifying the technology landscape and reducing dependency on a few dominant suppliers.

Microsoft’s New Strategy: Enhancing Kernel-Level Protection

In response to the broader concerns highlighted by the CrowdStrike incident, Microsoft is intensifying its focus on kernel-level security. The kernel, being the core component of the operating system, is a critical area that attackers often target. Microsoft's new strategy includes:

  • Strengthened Kernel Defenses: Implementing advanced measures to protect the kernel from attacks such as rootkits and unauthorized modifications.

  • Improved System Integrity: Ensuring that the core system remains secure and unaltered to prevent potential exploits.

  • Advanced Threat Detection: Deploying new technologies that offer better detection and response to kernel-level threats.

By focusing on kernel-level security, Microsoft aims to address the vulnerabilities that have been exposed and enhance the overall resilience of its operating systems.

CyberSecOp’s Role in Diversifying Security Strategies

At CyberSecOp, we have been proactively helping our clients diversify their vendor portfolios over the years. Our approach emphasizes not only identifying alternative solutions but also integrating them into a comprehensive security strategy. This diversification helps mitigate risks associated with over-reliance on a single supplier and ensures that our clients have a robust defense against potential threats.

Moreover, CyberSecOp operates on a diversified supply chain model, aligning with the evolving needs of our clients and the broader market. This model ensures that we can provide a wide range of secure solutions and adapt to changes in the technology landscape effectively.

Opportunities for Smaller Technology Providers

The shift towards exploring alternative solutions is opening up opportunities for smaller, emerging technology providers. As larger organizations and government bodies seek alternatives to mainstream products, they are finding that smaller, innovative companies offer competitive solutions with robust security measures. This shift is leveling the playing field and allowing new players to enter the market, challenging the existing dominance of major tech giants.

Implications for the Technology Market

  1. Increased Market Diversity: The push towards alternative solutions is fostering a more diverse technology market. Smaller companies are now better positioned to compete, offering specialized and secure solutions that might have previously been overlooked.

  2. Enhanced Security: Organizations can improve their overall security posture by integrating a broader range of products and solutions. This diversification helps to mitigate the risk associated with relying on a single supplier.

  3. Growth in Innovation: The entry of smaller players into the market encourages innovation, bringing fresh perspectives and cutting-edge technologies to address cybersecurity challenges.

  4. Reduced Monopoly Power: As organizations and government bodies explore alternative solutions, the dominance of a few major tech firms is being challenged, leading to a more competitive and balanced industry.

Conclusion

The CrowdStrike incident, stemming from a problematic update, has triggered a significant shift in boardroom and government cybersecurity strategies. By moving away from over-reliance on a few suppliers and exploring diverse alternatives, leaders are enhancing their security measures and opening doors for smaller technology providers. Additionally, Microsoft’s new focus on kernel-level protection represents a proactive step toward addressing core vulnerabilities.

At CyberSecOp, our commitment to diversifying vendor portfolios and operating on a diversified supply chain model aligns with these evolving strategies, helping clients navigate these changes and strengthen their security posture. This shift promises to foster a more dynamic and secure technology market, drive growth, and reduce the monopolistic control exerted by larger organizations. Staying informed and adaptable will be crucial for organizations navigating these changes and capitalizing on new opportunities in the cybersecurity sector.

 

Read More
CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

The Rise of VCISO and VCTO: Safeguarding Systems and Ensuring Compliance

Today's digital landscape looms large with cyber threats, and ever changing compliance and regulatory requirements organizations are increasingly turning to Virtual Chief Information Security Officers (VCISOs), Virtual Chief Technology Officers (VCTOs) and related outside counsel to bolster their defenses and ensure compliance. These virtual roles offer specialized expertise and strategic guidance without the overhead costs associated with full-time executive positions. For enterprise organizations, having the ability to engage an independent third party to validate ideas, policies and processes while also providing guidance and support to the technical executive suite is a key differentiator.

Let's explore why organizations are embracing VCISOs and VCTOs and how these professionals are essential in protecting systems and ensuring compliance.

Expertise in Cybersecurity

Cybersecurity threats are evolving at an alarming rate, with sophisticated attacks targeting businesses of all sizes. VCISOs play a crucial role in developing, implementing and validating robust cybersecurity strategies tailored to an organization's unique needs. They bring extensive experience in threat assessment, risk management, incident response, and security best practices. By partnering with a VCISO, organizations gain unbiased access to up-to-date knowledge and proactive measures to mitigate risks.

Strategic Technology Leadership

Technology, the backbone of modern enterprises, driving innovation, efficiency, and growth also can be our Achilles heal if not properly governed

VCTOs focus on strategic oversight of an organization's technology infrastructure and operations. They ensure technology investments align with business objectives while optimizing performance and scalability while managing the threat landscape. From cloud adoption to digital transformation initiatives, VCTOs offer invaluable insights and guidance to navigate complex technological landscapes.

Cost-Effective Solution

VCISOs and VCTOs offer cost-effective solutions that provide expertise on an as needed and scheduled basis. This allows organizations to access top-tier talent with the flexibility and level of enablement organizations can use to address their needs and priorities.

Compliance and Regulatory Adherence

Compliance has become non-negotiable in an era of stringent data protection regulations such as GDPR, CCPA, and HIPAA. VCISOs and VCTOs are well-versed in regulatory requirements and industry standards, ensuring organizations adhere to relevant laws and guidelines. They validate established governance frameworks, conduct audits, and implement controls to safeguard sensitive data and maintain regulatory compliance. With the benefit of being an independent third party, VCISOs and VCTs are able to provide the oversight and governance auditors require and insurance companies appreciate, further mitigating financial risk and exposure.  

Tailored Solutions for Diverse Industries

Whether in finance, healthcare, or manufacturing, these virtual executives collaborate closely with internal teams to align security and technology strategies with organizational goals. It is important to keep in mind that every industry faces unique challenges and changing regulatory landscapes.

Conclusion

Having access to VCISOs and VCTOs is key to enhancing an organizations strategic advantage as the technical and threat landscapes continue to evolve. By leveraging the skills of VCISOs and VCTOs, organizations are better positioned against cyber threats, optimize technology investments, and maintain regulatory integrity, safeguarding their reputation and sustaining long-term success.

Read More
CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

What is Regulations Compliance and Cybersecurity Compliance?

Being compliant refers to adhering to specific laws, regulations, standards, or guidelines relevant to a particular industry or field. Compliance ensures that organizations operate within legal boundaries, meet industry standards, and uphold ethical practices. In the context of cybersecurity, compliance involves implementing measures to protect sensitive data, prevent unauthorized access, and mitigate security risks.

In today's digital landscape, cybersecurity compliance is paramount for businesses to safeguard their assets and maintain trust with customers. Failure to comply with cybersecurity regulations can result in severe consequences, including legal penalties, financial losses, and reputational damage.

Cybersecurity services play a crucial role in helping organizations achieve and maintain compliance. These services encompass a range of offerings, including cybersecurity consulting, IT security services, and cybersecurity consulting services. Cybersecurity consultants assist organizations in identifying compliance requirements, assessing their current security posture, and implementing measures to meet regulatory standards.

Cybersecurity companies like CyberSecOp offer comprehensive solutions to assist organizations in navigating the complexities of cybersecurity compliance. Here's how CyberSecOp can help:

  1. Regulatory Expertise: CyberSecOp consultants possess in-depth knowledge of cybersecurity regulations and standards relevant to various industries. They can help organizations interpret complex compliance requirements and develop tailored strategies to address specific regulatory mandates.

  2. Risk Assessments: CyberSecOp conducts thorough risk assessments to identify potential security vulnerabilities and compliance gaps within an organization's infrastructure. By assessing risks proactively, organizations can prioritize remediation efforts and minimize the likelihood of compliance violations.

  3. Policy Development: CyberSecOp assists organizations in developing and implementing robust cybersecurity policies and procedures aligned with regulatory requirements. These policies cover areas such as data protection, access control, incident response, and employee training, ensuring comprehensive compliance coverage.

  4. Technical Solutions: CyberSecOp offers a range of technical solutions to enhance cybersecurity and facilitate compliance. This includes implementing encryption technologies, access controls, intrusion detection systems, and security monitoring tools to protect sensitive data and prevent unauthorized access.

  5. Training and Awareness: CyberSecOp provides cybersecurity training and awareness programs to educate employees about compliance requirements, security best practices, and the importance of maintaining a secure digital environment. By fostering a culture of cybersecurity awareness, organizations can empower employees to contribute to compliance efforts effectively.

  6. Continuous Monitoring and Compliance Audits: CyberSecOp conducts regular security assessments and compliance audits to ensure ongoing adherence to regulatory standards. By monitoring systems and processes continuously, organizations can identify and address compliance issues promptly, reducing the risk of regulatory penalties and data breaches.

In summary, CyberSecOp plays a vital role in helping organizations navigate the complexities of cybersecurity compliance. By offering regulatory expertise, conducting risk assessments, developing policies and procedures, implementing technical solutions, providing training and awareness, and conducting continuous monitoring and audits, CyberSecOp assists organizations in achieving and maintaining compliance with confidence. With CyberSecOp's support, organizations can enhance their security posture, mitigate risks, and demonstrate a commitment to protecting sensitive data and maintaining compliance with applicable regulations.

Read More
CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

Navigating the Sea of Data Privacy Laws and Cyber Regulations in 2024

Introduction

Fasten your digital seatbelts, because 2024 is shaping up to be a global whirlwind of data privacy and cybersecurity regulations. From five new comprehensive state data privacy laws in the US, including the Utah Consumer Privacy Act (UCPA) taking effect at the end of 2023, to radical new consumer health data privacy laws, businesses worldwide face unprecedented compliance challenges. But fear not, intrepid captains of your digital vessels! A robust security and privacy program can be your life raft in this regulatory storm, no matter where you navigate the digital seas.

The Perfect Storm: New Privacy, Breach Notification, and Cybersecurity Laws (Worldwide)

This year, businesses are facing a global regulatory tsunami:

1. New Privacy Laws: The US isn't alone. Comprehensive data privacy laws are popping up worldwide, with jurisdictions like Brazil, China, California, Australia, and now Utah, Texas, Oregon, Florida, and Montana leading the charge. Each law brings its own unique requirements, making compliance a complex international puzzle.

2. Breach Notification Blitz: Data breaches are a global concern, and governments are responding with stricter notification laws. From the EU's GDPR to India's Personal Data Protection Bill, expect to see tighter deadlines, broader notification requirements, and potential penalties for failing to report breaches promptly.

3. Cybersecurity Mandates on the March: Governments are raising the bar on cybersecurity, imposing new mandates and standards on businesses across industries. From zero trust requirements to software assurance guidelines, staying compliant will require proactive investment in your security posture.

Key US Data Privacy Laws and Health Data Privacy Regulations to Be Aware of in 2024:

Data Privacy Laws:

  • Utah Consumer Privacy Act (UCPA) - Effective December 31, 2023: Applies to businesses exceeding $25 million in revenue and processing data of 100,000 or more Utah residents. Grants Utah residents rights to access, delete, and opt-out of the sale of their personal data.

  • Texas Data Privacy and Security Act (TDPSA) - Effective July 1, 2024: Applies to businesses exceeding $25 million in revenue and handling data of Texas residents. Grants similar rights to UCPA, with additional restrictions on data deletion and requiring data security measures.

  • Oregon Consumer Privacy Act (OCPA) - Effective July 1, 2024: Applies to businesses exceeding $25 million in revenue and handling data of 100,000 or more Oregon residents. Grants similar rights to UCPA, with emphasis on data minimization and specific requirements for obtaining consumers' consent.

  • Florida Digital Bill of Rights - Effective July 1, 2024: Establishes principles for data privacy but does not create individual rights or enforcement mechanisms. Requires businesses to disclose data collection practices and implement data security measures.

  • Montana Consumer Data Privacy Act (MCDPA) - Effective October 1, 2024: Applies to businesses exceeding $25 million in revenue and handling data of 25,000 or more Montana residents. Grants rights to access, correct, and delete personal data, with exemptions for specific sectors.

Health Data Privacy Regulations:

  • Washington My Health My Data Act: Enacted in May 2023, prohibits the selling of Washingtonians' health data and restricts collection and sharing without consent. Imposes geofencing limitations around sensitive healthcare facilities.

  • Nevada Consumer Health Privacy Law (SB 370): Effective March 31, 2024, prohibits selling consumer health data without written consent and restricts collection and sharing. Similar geofencing limitations as Washington.

  • Amended California Consumer Privacy Act (CCPA) Regulations: Taking effect July 1, 2023, expand CCPA's scope to include specific consumer rights regarding their health data.

  • Colorado Universal Opt-Out Mechanisms: Effective July 1, 2023, requires businesses exceeding $100 million in gross revenue to offer a universal opt-out mechanism for the sale of personal data, including health data.

  • Connecticut Senate Bill 3: Took effect July 1, 2023, adds "consumer health data" to its data privacy act, requiring opt-in consent for selling and imposing geofencing restrictions around sensitive healthcare facilities.

Navigating the Calm After the Storm with CyberSecOp

2024 has indeed become a tsunami of data privacy and cybersecurity regulations, leaving businesses feeling like they're caught in a riptide. But fear not, weary sailors! Just as a lighthouse guides ships through treacherous waters, a robust security and privacy program can be your beacon of stability in this ever-changing regulatory landscape.

Implementing a comprehensive program isn't just about weathering the storm – it's about thriving in the calmer seas ahead. By prioritizing compliance, you can:

  • Avoid costly fines and legal action: Proactive measures significantly reduce the risk of non-compliance penalties.

  • Build trust and loyalty with customers: Demonstrating your commitment to data privacy fosters trust and encourages customer loyalty.

  • Reduce the likelihood and impact of data breaches: Robust security measures minimize the risk of breaches and mitigate their potential damage.

  • Gain a competitive edge: Being ahead of the curve on privacy regulations can attract privacy-conscious consumers and partners.

This is where organizations like CyberSecOp come in. We're not just your life raft in the storm – we're your skilled navigators, equipped with the expertise and resources to chart a course towards secure and compliant waters. Here's how we can help:

  • Conduct thorough security and privacy assessments: Identify vulnerabilities and gaps in your current posture, providing a clear roadmap for improvement.

  • Develop and implement tailored security and privacy programs: Create solutions that meet your specific needs, industry regulations, and global reach.

  • Stay ahead of the curve with ongoing monitoring and updates: Our team keeps you informed of evolving regulations and industry best practices.

  • Respond effectively to data breaches: Minimize the impact of breaches and ensure compliance with reporting requirements.

  • Offer expert guidance and support throughout your journey: Our team of experienced professionals is here to answer your questions and address your concerns.

Don't wait for the next regulatory wave to hit. Contact CyberSecOp today and let us help you navigate the ever-changing seas of data privacy and cybersecurity with confidence. Together, we can ensure your business sails smoothly towards a successful and secure future.

Read More
CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

Enterprise Risk Management vs. Traditional RM

Enterprise Risk Management (ERM) introduces effective risk management (RM) by attacking the issues differently to assess and remediate risks that affect the business. It takes a more robust approach than traditional Risk Management.

Traditional Risk: Business unit leaders, directors, and managers were responsible and accountable for risks in their respective departments. An example is the CFO, or Comptroller is responsible for risks relating to business cash flow and finance. This approach is very siloed.  Having some type of Risk management is better than not having it, but this approach does have its shortcomings:

 

  • Unidentified risks that don’t fit nicely within a silo. Risks can be anywhere, and sometimes they do not necessarily align with the organizational chart resulting in unidentified risks.

  •  Some risks may span multiple business units. If one leader identifies the risk the business may not understand its true impact and likelihood if it spans multiple departments.  An example of this would be a privacy law that affects Spain for example. If the compliance officer ranks this as very low risk because there is no business/consumers or data from Spain residents. However, down the hall in another c-suite office, there are ongoing talks about a possible partnership with a platform in that same country.

  •  Silo risk owners may address a risk in their domain but not understand that the mitigations of their risk can affect another department.  A classic example is an IT change that mitigates some technical risks but impacts usability for other departments. This leads to frustration, confusion and ‘shadow IT’

  •  Traditional risk typically focused on internal risks. ERM focuses on external factors as well

  Holistic Top-Down Enterprise Risk Management

Enterprise Risk Management attempts to fill these gaps by incorporating a holistic, all-hands-on-deck approach to risk management. EMR is a top-down approach that starts from a strategic approach that trickles down to the operational level (Beasley, 2016).

 ERM begins with an understanding of what the organization is trying to achieve short and long term. Identifying all assets (people, technology, data, solutions, networks) ranking those assets, identifying risks and then ultimately remediation and monitoring. It is key to understand that top management and key staff are involved in this process, not just a department leader.  

 Identify all risks. Whereas with traditional risk management, risks that fall out of a department can be missed, EMR focuses on strategy, compliance, operations, and tactics to attempt to address all risks (internal and external).  

The output of EMR should be a risk register that clearly identifies the enterprise's top risks that identify:

  • Risk identification number

  • Owner, responsible, and accountable parties

  • Risk description

  • Risk Remediation

  • Risk milestones

  • Key Risk Indicators


EMR takes a more holistic approach to risk management and incorporates all levels of the business (strategy, tactical, operational). EMR focuses on internal and external risks. EMR is a cycle and not a project; the focus is always on understanding the business's top threats, their remediations if they are being implemented, and how effective those mitigations are.  This approach is the next step in the evolutionary process of risk management and provides one of the most impactful and thorough methods for risk management.

 

Written by:

Carlos Neto 1/9/2023

 

References:

Beasley , M. (2016). What is enterprise risk management? - North Carolina State University. NC State . Retrieved January 10, 2023, from https://erm.ncsu.edu/az/erm/i/chan/library/What_is_Enterprise_Risk_Management.pdf

Read More
CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

Don't let a cyber security breach damage your reputation

Cybersecurity breaches have cost many organizations some of their largest clients. While most organizations quickly hire legal experts, public relations teams, and a cyber security firm like CyberSecOp, the reputation damages have already begun. For example, your client may not have access to your services for hours before you realize that your system was affected.

Prime attack time

Attackers are strategic with time selection to minimize their activities being seen by employees.  Most attackers operate on weekends or at night, knowing that most organizations’ employees do not access or monitor systems at this time.

When does reputation damage begin?

Reputation issues may begin long before the organization knows about an attacker. Some attackers disclose information on social media so that the organization will act quickly to their demands. Most cybercriminals spend an average of three months on clients’ systems before they act, but by this point, they may have already sold your data on the dark web or to your competitor.

Disclosing sensitive information violates privacy policies and requirements such as CCPA, GDPR, and some states’ and countries’ data protection regulations or requirements. The data disclosed may also include clients and your client’s customer information, putting your clients at risk. They, too, need to report the breach to their customers and provide the necessary protection to protect their customer’s credit and identity.

Reputation damage extends to your client.

 At this point, not only is your organization’s reputation is in jeopardy, but also the reputation of your client and your client’s customers. All of these expenditures may be a liability to your organization if the breach is on your side, especially if there is evidence that you didn’t take due care regarding your organization’s security posture.  

Conclusion

Defense-in-depth security program

Having a defense-in-depth security program such as those offered by CyberSecOp, cannot only save your business money but can also help you compete against other companies that have not implemented a security program.  Most organizations have implemented a vendor management program to mitigate their threat against a third-party risk. A security program that includes third-party risk management is critical to identifying and remediating internal and external threats.

Read More
CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

CyberSecOp is an ISO 27001 Certified Cyber Security Consulting Firm

CyberSecOp is proud ISO 27001 Certified Organization

ISO+Press+Release.jpg

The team at CyberSecOp is ISO/IEC 27001:2013 (ISO 27001) certified.
International Organization for Standardization (ISO) is an internationally recognized standard that ensures that firms such as CyberSecOp, meet best practices for information security management systems and vigorous risk-based framework approach.

We are committed to following a high-quality and consistent security management system. A-lign, an independent, third-party auditor, found CyberSecOp to have technical controls in place and formalized IT Security policies and procedures. A-lign is an ISO / IEC 27001 certification body accredited by the ANSI-ASQ National Accreditation Board (ANAB) to perform ISMS 27001 certifications. Therefore, through ISO 27001, we have developed and implemented processes and procedures in order to provide requirements for establishing, implementing, maintaining, and continually improving an information security management system. The entire certification leads us to the appropriate requirements for an Information Security Management System (ISMS) in our company — a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes, and IT systems by applying a risk management processes.

Achieving the ISO 27001 certification is the result of a great amount of effort, dedication, and involvement from every member of the CyberSecOp team. We are constantly challenging ourselves to improve our service and provide the highest security and privacy standards to meet or exceed the needs and expectations of our customers.

Author: Carlos Neto

Information Security Officer

Read More
CyberSecOp Cybersecurity & Breach News CyberSecOp Cybersecurity & Breach News

Home Routers Major Weakness in Work from Home Revolution

‘Prepping’ for Work from Home

For the past few years employees and employers alike extolled the virtues of working from home (‘WFH’). We’ve heard the stories of how it leads to a happier and more productive employee, less overhead for the employer, and just more flexibility overall. Most people knew a shift would come eventually – kind of like the shift to IPV6- but it stalled and stalled. Then the pandemic happened and WFH had been thrust upon us with such force that businesses were, and still are, scrambling to get the pieces in place for an effective remote staff.

It is no longer a secret that WFH is here to stay. Many businesses including Fujitsu and Twitter have just gone ahead and implemented WFH ‘forever’. With this change come challenges. One of those is the security of routers in the millions upon millions of homes that now serve as working offices.  According to a study by Germany’s Fraunhofer Institute for Communication, vendors have failed to fix hundreds of vulnerabilities in their consumer-grade routers, leaving hundreds of thousands of users exposed to a wide range of attacks. "Nearly all were found to have security flaws, some of them very severe," the Fraunhofer Institute said in a press release. "The problems range from missing security updates to easily decrypted, hard-coded passwords, and known vulnerabilities that should have been patched long ago."

 Advice on next steps

So what should we do? The first step is to know the make and model of your router. Research it for any known vulnerabilities, as there may be some cases where the device is so insecure that even patching it still leaves it vulnerable. Once you’ve decided if it is worth keeping the device make sure that it automatically installed firmware updates. If not you may need to manually update it. A task that is well worth the effort. Another task is to make sure that the administrator password for the router has been changed from the default admin password. Many routers now have unique default passwords for their routers- but there are still plenty out there that don’t.

WFH Users should use complex passwords on their routers including:

·         Uppercase and Lowercase

·         Numbers and Symbols

·         At least 8 characters long

You should also use the strongest Wi-Fi encryption your router supports. WPA3 (Wi-Fi Protected Access Version 3) is best.

You may have children working, playing, and streaming while you are home. Ensure they use their own devices and do not surf on your work devices.

Router configuration and device hardening are just one of the many layers of security that businesses need to adapt and expand to their remote workforce. We here at CyberSecOp would not be surprised if, sooner rather than later, companies begin purchasing, installing, and administering home routers to ensure a secure endpoint to endpoint networking. Until then remain vigilant and patch patch patch!

Author: Carlos Neto

Read More