Auto dealers may face penalties for not meeting requirements established by amendments to the FTC’s Safeguard Rule. In 2021, the FTC amended its Safeguard Rule, originally created in 2003, to help protect the security of customer information. The Safeguard Rule applies to any non-banking financial institution.
Appalachia Technologies Blog
P R E S S R E L E A S E
Grantville, PA: On Wednesday, October 19, Appalachia Technologies will be hosting a free in-person cybersecurity summit at the Hollywood Casino at Penn National Race Course for regional CIOs, CISOs, and IT Security Leaders.
Sixth-Annual List & Research Identifies Leading Managed Security Service Providers Worldwide
September 20, 2022, Mechanicsburg, PA: MSSP Alert, a CyberRisk Alliance resource, has named Appalachia Technologies to the Top 250 MSSPs list for 2022 (http://www.msspalert.com/top250).
Security Misconfiguration
Last week we touched on the basics of the Open Web Application Security Project® (OWASP) and why it should be used as a source of information for keeping your web applications secure. This week we are going to touch on one particular vulnerability from the OWASP Top 10 Web Application Security Risks - Security Misconfiguration.
In your city or town, you know that stretch of road or highway that feels like it has been under construction for 10 years? In many ways, the development of CMMC can feel like it too is marked with orange cones and will be underway for years. From the most significant change of CMMC 1.0 (the OG version) to the November 2021 update to CMMC 2.0, to even the CMMC-AB name change to The Cyber AB, new information seems to keep coming with timelines shifting. While The Cyber AB holds monthly Town Hall webinars to share updates, the DoD and various vendors are also sharing out information via webinars. Recently, PreVeil, a DoD supplier, along with members of the Manufacturing Extension Partnership, hosted a webinar with DoD leaders Stacy Bostjanick (DoD CMMC Program Head) and Dave McKeown (DoD CISO) to review recent updates and timelines.
I sat in the parking lot watching employees walk in the corporate office. Ready with my five dozen donuts, I waited until the perfect moment to see if I could infiltrate. It’s like the start of a great superhero movie - except starring Kevin James and not Christian Bale.
I had been hired by the company for a physical social engineering assessment. Only a few people (stakeholders and managers) within the company knew that this was occurring that day. The goal was to see if I could gain entry into the building unnoticed and once in, what I could access.
OWASP - is it something we don’t want to get stung by, or is it here to protect us? In cybersecurity, we’ve all heard the term, but what is it really?
There are many frameworks and security models to refer to when working to secure your organization. Sometimes it can prove to be overwhelming. Today I’m going to talk about three action items that will make a significant difference in your overall security posture. Keeping in mind that there is no silver bullet to securing an organization, these three will certainly gain a great return.
People carry less cash in their wallets than they used to. Even when going to the ice cream stand in the middle of summer, a debit or credit card is swiped instead of cash being tendered. The reason for this is simple - it’s easier to swipe a card than it is to carry a load of cash in your wallet. This has become an extremely convenient option over the years when making purchases. However, as is often the case, convenience comes with risk.
Ransomware – The What, Where, and Why
Everyone has heard stories by now of an organization getting hit by ransomware. From individuals to small and enterprise-level organizations, it can pop up anywhere and cause havoc. What is it? Where does it come from? Why isn’t it going away? Today we’re going to break it down.
Not a single day goes by that we don’t either hear the word security or read the word security. See? You’ve already read it twice! The internet is full of so much noise that it sometimes can be hard to filter out information that pertains to you and your organization, as well as what is credible. Today I thought I’d take a moment to give you some great sources for security news. These are sources that are very accurate and trustworthy.
Humans are the smartest beings on earth. So why is it that they are the number one cause for breaches that cost millions of dollars? It’s because they are kind.
Because of the kindness of human beings, they are easily manipulated by bad actors to give up private information or even hold a door. This is the foundation of Social Engineering.
Let’s face it. Security is expensive. Many organizations think of security as an unwanted expense when budgeting for the next fiscal year. However, no matter what industry an organization is in, security IS its business too.
Let’s face it. If you haven’t had a security incident within your organization, you will. Are you prepared? An IRP is a plan or playbook that needs to be established and practiced on a normal basis. When a breach happens, this is your playbook of who, how, and what steps to take to protect your organization and minimize impact. Let’s break down the steps of an Incident Response Plan (IRP).
Your company has been proactive in having a penetration test performed and you have the report in hand - so now what do we do with it?
If you are an organization with digital assets to protect, you’ve most likely heard the term Penetration Testing, also known as Pen Testing. Penetration testing is the process used to find vulnerabilities and leverage them to hack an organization.
Secure your Organization with the NIST Blueprint
Breaches are at all time high. Over 50 billion devices are connected to the internet. Some of them are secure, and some of them are not. Which category does your organization fall into?
The year is 2021. We don’t have flying cars or robot maids, but nearly 5 billion souls worldwide are now connected to the Internet and to each other. This is a beautiful thing and a remarkable feat of human ingenuity. However, every rose has its thorn (to borrow from the great post-modern philosopher Bret Michaels) and to us who work in cybersecurity, 2021 was thornier than ever.
Here is Appalachia’s 2021 Cybersecurity Year in Review!
What is MDM?
Mobile Device Management is software that allows companies to administrate mobile devices like smartphones or tablets. Many people are familiar with desktop PCs connected to a local domain. MDM is based on a similar idea, but MDM allows settings, apps, and content to be managed across different operating systems (like iOS or Android) and devices do not need to be connected to a local domain controller. Essentially, it allows companies to manage phones and tablets no matter where those devices are located.
Even organizations with solid cybersecurity programs will have findings from a security assessment. After all, cyber attacks and attackers continue to learn and evolve, always trying to be one step ahead of their prospects. Through our years of performing security assessments, here are the Top 5 areas that we have found to need remediation work post-assessment.