Brad White

Step five of building cybersecurity: Implementing the CIA triad to combat risks

Part 7 of Cybera’s Introduction to Cybersecurity series Confidentiality, integrity and availability — also known as the CIA or AIC triad — is a model designed to guide policies and actions to build information security within an organization. Confidentiality The National Institute of Standard and Technology (NIST) defines confidentiality as:  “Preserving authorized restrictions on information […]

Step five of building cybersecurity: Implementing the CIA triad to combat risks Read More »

Step Four of building cybersecurity: Identifying your risks

Part 6 of Cybera’s Introduction to Cybersecurity series What are some of the top cybersecurity challenges? Cybersecurity is continually challenged by hackers, data loss, privacy demands, and increased surface attack risks, coupled with the need to constantly evolve security strategies. These strategies must address these external threats, as well as internal pressures from any workforce

Step Four of building cybersecurity: Identifying your risks Read More »

Step three of building cybersecurity: Threats vs Attacks

Part 5 of Cybera’s Introduction to Cybersecurity series In our previous post, we defined “attacks” and “threats”, and provided a comprehensive list of the different threats modern organizations typically face. In this post, we’ll focus on attacks. What is an attack? While threats are not always intentional (e.g. natural disasters), an attack is an intentional,

Step three of building cybersecurity: Threats vs Attacks Read More »

Step two of building cybersecurity: What threats do you face?

Part 4 of Cybera’s Introduction to Cybersecurity series Once you have developed a full inventory of your operational environment (as outlined in our previous post), the next step is to try and uncover the intentional and unintentional dangers they face. From a security standpoint, threats and attacks are two separate but critical issues. For network

Step two of building cybersecurity: What threats do you face? Read More »

Step one of building cybersecurity: What do you Know?

Part 3 of Cybera’s Introduction to Cybersecurity series In our previous blog post, we talked about the importance of cybersecurity in the modern world, and the different kinds of “threats” and “attacks” institutions commonly face. Today, we’ll review how best to understand your operational environment in order to determine your specific cybersecurity risks. Knowledge is

Step one of building cybersecurity: What do you Know? Read More »

Cybera’s Introduction to Cybersecurity Series

Part 1 – Introduction For cybersecurity to be effective within any organization, it needs to be addressed as a continual lifecycle. Every day, new attacks are developed, so existing methods to repel them must be refined and improved. Why is cybersecurity important? Cybersecurity matters to everyone, from governments and large corporations, to small businesses, individual

Cybera’s Introduction to Cybersecurity Series Read More »

What is cybersecurity?

Cybersecurity…how to eat an elephant one bite at a time Part 2 of Cybera’s Introduction to Cybersecurity series Cyberattacks are on the rise. According to the annual ITRC (Identity Theft Resource Center) Data Breach Report, there was a 68% increase in reported U.S. data compromises from 2020 -2021. Moreover, breaches related to cyberattacks represented more

What is cybersecurity? Read More »