Home  About  Next  Members  Contact  Faith

Take steps for cybersecurity

¤ 1.Protection
¤ 2.Training - Security Awareness & Tools
¤ 3.
Advanced Security
¤ 4.Compliance as a Service
¤ 5.Governance, Risk & Compliance (GRC)
¤ 6.
Penetration tests
¤ 7.Virtual Chief Security Officer (vCSO)
¤ 8.Other Expertise

 

Protection

Cybersecurity is a critical concern for small businesses and home users alike. With the increasing use of computers and digital technology, these groups are becoming prime targets for cybercriminals, leading to financial loss, identity theft, and damage to reputation. The bad guys never let up, and are constantly finding new people and businesses to attack. You are not too small; the question is not whether you will be attacked, but when.

Small businesses, often considered the backbone of small-town economies, are particularly vulnerable. They typically handle sensitive customer data but may lack robust cybersecurity infrastructure. The loss of data can result in significant financial losses and erode customer trust, which is vital for maintaining community support and loyalty.

Home users are also at risk, especially with the prevalence of smart devices and working remotely. Home networks can be gateways for cybercriminals to access personal information and potentially gain access to larger networks in the work place.

Traditional antivirus software may not be sufficient to combat advanced threats. Each computer that you use is called an "end-point", because it is sending and receiving Internet traffic. Endpoint Detection and Response (EDR) solutions offer a more comprehensive approach by continuously monitoring and analyzing end-point data to identify suspicious activities. EDR provides real-time protection and enables faster response to incidents, significantly enhancing defense against sophisticated cyber attacks.

Price need not be a factor. Many small and medium businesses (SMB) lack funds for expensive solutions and cannot afford big payments as one-time costs. Many MSPs permit SMBs to rent what they need, sometimes with rent-to-own terms. A small monthly service fee may be easier to handle. At the same time, many SMBs could benefit from having a cybersecurity expert meet with the business owners on a regular basis, possibly as a virtual Chief Security Officer (vCSO), to ensure the SMB remains well positioned to meet evolving threats.

To enhance cybersecurity, individuals and businesses should:

  • keep all software and systems up to date with the latest security patches
  • use complex passwords
  • add an extra layer of security with multi-factor authentication
  • educate employees about safe internet practices
  • regularly backup important data
  • use reputable antivirus software
  • consider EDR solutions for comprehensive protection
  • ensure Wi-Fi networks are secure and encrypted
  • protect networks with next generation firewalls
  • consider obtaining cybersecurity insurance1
  • implement PCI DSS to safeguard credit card payments1.

1 Further controls may be required.

By understanding the risks and implementing effective security measures, including advanced solutions like EDR, individuals and businesses can protect themselves from the potentially devastating effects of cyber attacks. It's not just about safe-guarding data; it's about ensuring the continuity, reputation, and trustworthiness of your personal and professional life. Stay vigilant, stay informed, and make cybersecurity a priority in your digital world.

Adapted from an article in North Grenville Times, printed April 18, 2024, by Wallace Cinnamon.

Training

Learn from us about IT security, and also about computer software.

  1. I am a freelance trainer, sometimes on contract with a training company. To sign up their courses, visit theknowledgeacademy.com (TKA).
  2. pi Sec Audit can develop new courses by arrangement (live or remote):
    • educate employees about safe internet practices through Security Awareness Training (SAT)
    • safeguard credit card payments, by complying with PCI DSS latest version
    • Programming such as JavaScript, Perl, php, Visual Basic for Applications (VBA)
    • Organizing data in Excel or Relational databases (SQL, mySQL)
    • Web design using HTML, CSS, XML, XSL
    • Larger enterprises like banks and insurance companies may also be interested in:
      • Overview of changes to security standards such as NIST CyberSecurity Framework; NIST Risk Management Framework; COBIT; and CCCS ITSG-33, 22, 20
      • How to conduct Privacy Impact Assessment (PIA) to ensure the privacy of customer and employee data is adequately protected
      • How to conduct an Harmonized Threat Risk Assessment (HTRA) to determine which new or existing controls will be most effective
  3. These courses are different from the TKA courses. For a sample of my teaching style, watch the video here (prepared for TKA on June 18, 2021).

Related cybersecurity standards are available from:
CCCS: Canadian Centre for Cyber Security
ITSG: Information Technology Security Guideline
NIST: National Institute of Standards and Technology (US Dept. of Commerce)
PCI DSS: Payment Card Industry Data Security Standard

 

 

 


Advanced Security

Under construction This section will be posted soon...

 

 

 


Compliance as a Service

Under revision

Engage us to review the security of your IT environment:

  1. Privacy Impact Assessment to ensure your data is in compliance with privacy standards
  2. Threat Risk Assessment to gain assurance you are providing the best protection of your data
  3. Compliance review against standards such as NIST CyberSecurity Framework, COBIT, and Internal Controls over Financial Reporting - General Computing Controls (ICFR-GCC).
  4. Effectiveness review of your current controls and procedures.
     

 

 

 


Governance, Risk & Compliance

Under revision

  1. Policies ...
  2. Procedures ...
  3. Processes ...

 

 

 


Penetration Tests

Under construction This section will be posted soon...

 

 

 


Virtual Chief Security Officer

Under construction This section will be posted soon...

 

 

 


Other Expertise

Under revision

  1. Project Management to plan & implement security, or to develop business applications
  2. Technical Writing to produce policies & procedures, user guides, technical manuals, and support scripts
  3. Develop new web sites for you or your company, with on-line forms and backend databases.
 

 

 

 


©2005-2024, 964317 Ontario Inc.