by Chris Moschovitis | Feb 3, 2023
In recent posts on this blog, I’ve talked about which bad guys are likely coming after your assets—that’s the who. We also discussed a few reasons why—an employee with a grudge, for example, or a jealous competitor, or a greedy stranger. Having assessed all that, the...
by Chris Moschovitis | Jan 27, 2023
In order to get a handle on who is coming after your data and how to stop them, you’ll need to perform some threat assessments. Sounds scary, but I’ll walk you through it. The National Institute of Standards and Technology (NIST), which is a key player in the...
by Chris Moschovitis | Jan 20, 2023
With the coming of the Chinese New Year beginning on January 22, we leave the fearsome Year of the Tiger and scurry into the Year of the Rabbit. In the Chinese zodiac, the Tiger is symbolic of fierce competition and unpredictability, while the Rabbit is associated...
by Chris Moschovitis | Jan 17, 2023
In The Calls are Coming from Inside the House: Threats, Part I, I talked about internal threats—such as current and former employees and subcontractors—who may have ill intent or may just be thoughtless with data. But when it comes to threat assessment, internal...
by Chris Moschovitis | Jan 13, 2023
In Cover Your Assets!, I introduced one of the most basic tenets of cybersecurity: if there’s something of value to you (an asset), then it’s of value to someone else. In my business, those “someone else”s are referred to as threats. To get a handle on your specific...