<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fortress SRM, Author at Fortress SRM</title>
	<atom:link href="https://fortresssrm.com/author/xponent21/feed/" rel="self" type="application/rss+xml" />
	<link>https://fortresssrm.com/author/xponent21/</link>
	<description>Full-Spectrum Cybersecurity Protection</description>
	<lastBuildDate>Tue, 15 Jul 2025 15:49:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://fortresssrm.com/wp-content/uploads/2021/05/cropped-FORT_Favicon-32x32.png</url>
	<title>Fortress SRM, Author at Fortress SRM</title>
	<link>https://fortresssrm.com/author/xponent21/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Security &#038; Threat Updates – July 2025</title>
		<link>https://fortresssrm.com/security-threat-updates-july-2025/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 15:41:38 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1732</guid>

					<description><![CDATA[<p>Attention Fortress SRM Patching Customers, Please see below updates on recent threat intelligence news, Microsoft’s July Patch Tuesday and other notable 3rd Party critical vulnerabilities. Recent in Threat Intelligence News: ...</p>
<p>The post <a href="https://fortresssrm.com/security-threat-updates-july-2025/">Security &amp; Threat Updates – July 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attention Fortress SRM Patching Customers,</p>



<p>Please see below updates on recent threat intelligence news, Microsoft’s July Patch Tuesday and other notable 3rd Party critical vulnerabilities.</p>



<p><strong>Recent in Threat Intelligence News:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://www.scworld.com/brief/ai-driven-id-fraud-surges-195-globally" target="_blank" rel="noreferrer noopener">AI-driven ID fraud surges 195% globally</a></strong></li>



<li><strong><a href="https://cybersecuritynews.com/ai-tools-direct-users-phishing-sites/" target="_blank" rel="noreferrer noopener">AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones</a></strong></li>



<li><strong><a href="https://www.securityweek.com/apple-netflix-microsoft-sites-hacked-for-tech-support-scams/" target="_blank" rel="noreferrer noopener">Apple, Netflix, Microsoft Sites &#8216;Hacked&#8217; for Tech Support Scams </a></strong></li>



<li><strong><a href="https://cybersecuritynews.com/dmv-themed-phishing-attacks/" target="_blank" rel="noreferrer noopener">DMV-Themed Phishing Attacks Targeting U.S. Citizens to Steal Sensitive Data</a></strong></li>



<li><strong><a href="https://www.bleepingcomputer.com/news/security/google-warns-scattered-spider-hackers-now-target-us-insurance-companies/" target="_blank" rel="noreferrer noopener">Hackers switch to targeting U.S. insurance companies</a></strong></li>



<li><strong><a href="https://cyble.com/blog/hacktivists-launch-ddos-attacks-at-us-iran-bombings/" target="_blank" rel="noreferrer noopener">Hacktivists Launch DDoS Attacks At U.S. Following Iran Bombings</a></strong></li>



<li><strong><a href="https://www.ic3.gov/CSA/2025/250630.pdf" target="_blank" rel="noreferrer noopener">Iranian Cyber Actors May Target Vulnerable US Networks and Entities of Interest</a></strong></li>



<li><strong><a href="https://www.csoonline.com/article/4011379/iranian-cyber-threats-overhyped-but-cisos-cant-afford-to-let-down-their-guard.html" target="_blank" rel="noreferrer noopener">Iranian cyber threats overhyped, but CISOs can’t afford to let down their guard</a></strong></li>



<li><strong><a href="https://thehackernews.com/2025/06/massive-73-tbps-ddos-attack-delivers.html" target="_blank" rel="noreferrer noopener">Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider</a></strong></li>



<li><strong><a href="https://www.msspalert.com/brief/microsoft-tightens-security-defaults-for-windows-365-and-microsoft-365" target="_blank" rel="noreferrer noopener">Microsoft Tightens Security Defaults for Windows 365 and Microsoft 365</a></strong></li>



<li><strong><a href="https://blog.checkpoint.com/research/exposing-scattered-spider-new-indicators-highlight-growing-threat-to-enterprises-and-aviation/" target="_blank" rel="noreferrer noopener">Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation</a></strong></li>



<li><strong><a href="https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/" target="_blank" rel="noreferrer noopener">16 billion passwords exposed in infostealer data leak​</a></strong></li>
</ul>



<p><strong>Microsoft Vulnerabilities:</strong></p>



<p>Microsoft disclosed a total of&nbsp;<strong>137</strong>&nbsp;vulnerabilities this month affecting its current operating system, including&nbsp;<strong>14</strong>&nbsp;<strong>critical</strong>&nbsp;vulnerabilities and&nbsp;<strong>one</strong>&nbsp;<strong>zero-day</strong>&nbsp;vulnerability. June 2025 Patch Tuesday addresses vulnerabilities across multiple categories:</p>



<ul class="wp-block-list">
<li><strong>53</strong> Elevation of Privilege vulnerabilities</li>



<li><strong>41</strong> Remote Code Execution vulnerabilities</li>



<li><strong>18</strong> Information Disclosure vulnerabilities</li>



<li><strong>8</strong> Security Feature Bypass vulnerabilities</li>



<li><strong>6 </strong>Denial of Service vulnerabilities</li>



<li><strong>4</strong> Spoofing vulnerabilities</li>
</ul>



<p>The most critical Common Vulnerabilities and Exposures (CVEs) are highlighted below:</p>



<p><strong>&nbsp;&nbsp;&nbsp; Windows Zero-Days:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49719" target="_blank" rel="noreferrer noopener">CVE-2025-49719 </a>&#8211; Microsoft SQL Server Information Disclosure Vulnerability</strong></li>



<li>Microsoft SQL server vulnerability could allow a remote, unauthenticated attacker to access data from uninitialized memory through improper input validation.</li>



<li>Vulnerability is publicly disclosed and is not actively being exploited in the wild.</li>
</ul>



<p><strong>&nbsp;&nbsp;&nbsp; Other Critical CVE’s worth mentioning:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49697" target="_blank" rel="noreferrer noopener">CVE-2025-49697</a> / <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49695" target="_blank" rel="noreferrer noopener">49695</a> / <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49696" target="_blank" rel="noreferrer noopener">49696</a></strong> <strong>/ <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49702" target="_blank" rel="noreferrer noopener">49702</a></strong> <strong>– Microsoft Office Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49704" target="_blank" rel="noreferrer noopener">CVE-2025-49704</a></strong> <strong>– Microsoft SharePoint Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49717" target="_blank" rel="noreferrer noopener">CVE-2025-49717</a></strong> <strong>– Microsoft SQL Server Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49703" target="_blank" rel="noreferrer noopener">CVE-2025-49703</a> / <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49698" target="_blank" rel="noreferrer noopener">49698</a></strong> <strong>– Microsoft Word Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-36350" target="_blank" rel="noreferrer noopener">CVE-2025-36350</a></strong> <strong>– AMD Transient Scheduler Attack in Store Queue</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-36357" target="_blank" rel="noreferrer noopener">CVE-2025-36357</a></strong> <strong>– AMD Transient Scheduler Attack in L1 Data Queue</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47981" target="_blank" rel="noreferrer noopener">CVE-2025-47981</a></strong> <strong>– SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-48822" target="_blank" rel="noreferrer noopener">CVE-2025-48822</a></strong> <strong>– Windows Hyper-V Discrete Device Assignment (DDA) Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47980" target="_blank" rel="noreferrer noopener">CVE-2025-47980</a></strong> <strong>– Windows Imaging Component Information Disclosure Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49735" target="_blank" rel="noreferrer noopener">CVE-2025-49735</a></strong> <strong>– Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability</strong></li>
</ul>



<p><strong>3rd&nbsp;Party Critical CVE’s worth mentioning:</strong></p>



<p><strong>Adobe Products&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<p>Adobe released 13 bulletins covering a total of 60 CVE’s. Of these, 39 of the flaws are rated as critical. The flaws could lead to arbitrary code execution, arbitrary file system read, memory leak, application Denial-of-Service, security feature bypass, and privilege escalation within varying Adobe products, listed below.</p>



<ul class="wp-block-list">
<li><strong><a href="https://helpx.adobe.com/security/products/after_effects/apsb25-49.html" target="_blank" rel="noreferrer noopener">After Effects</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-54.html" target="_blank" rel="noreferrer noopener">Substance 3D Viewer</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/audition/apsb25-56.html" target="_blank" rel="noreferrer noopener">Audition</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/incopy/apsb25-59.html" target="_blank" rel="noreferrer noopener">InCopy</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/indesign/apsb25-60.html" target="_blank" rel="noreferrer noopener">InDesign</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/connect/apsb25-61.html" target="_blank" rel="noreferrer noopener">Connect</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/dimension/apsb25-63.html" target="_blank" rel="noreferrer noopener">Dimension</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-64.html" target="_blank" rel="noreferrer noopener">Substance 3D Stager</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/illustrator/apsb25-65.html" target="_blank" rel="noreferrer noopener">Illustrator</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/framemaker/apsb25-66.html" target="_blank" rel="noreferrer noopener">FrameMaker</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html" target="_blank" rel="noreferrer noopener">AEM Forms</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html" target="_blank" rel="noreferrer noopener">AEM Screens</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html" target="_blank" rel="noreferrer noopener">ColdFusion</a></strong></li>
</ul>



<p><strong>Cisco&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7" target="_blank" rel="noreferrer noopener">CVE-2025-20309</a></strong> <strong>– Cisco Unified Communications Manager Static SSH Credentials Vulnerability (Critical)</strong></li>



<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6" target="_blank" rel="noreferrer noopener">CVE-2025-20281 / 20282</a> – Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities (Critical)</strong></li>
</ul>



<p><strong>Thunderbird:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2025-54/" target="_blank" rel="noreferrer noopener">Security Vulnerabilities fixed in Thunderbird 140 — Mozilla</a></strong></li>
</ul>



<p><strong>Fortinet&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-035" target="_blank" rel="noreferrer noopener">CVE-2024-27779</a> – Insufficient Session Expiration Vulnerability in FortiSandbox &amp; FortiIsolator</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-511" target="_blank" rel="noreferrer noopener">CVE-2024-52965</a> – PKI via API Authentication Granted with an Invalid Certificate in FortiOS &amp; FortiProxy</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-25-026" target="_blank" rel="noreferrer noopener">CVE-2025-24477</a> – Heap-based Buffer Overflow Vulnerability in FortiOS cw_stad daemon</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-053" target="_blank" rel="noreferrer noopener">CVE-2025-55599</a> – Improperly Implemented Security Check for Standard vulnerability in FortiOS and FortiProxy</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-437" target="_blank" rel="noreferrer noopener">CVE-2025-24474</a> – Improper Neutralization of Special Elements used in an SQL Command (&#8216;SQL Injection&#8217;) vulnerability in FortiManager and FortiAnalyzer</strong></li>
</ul>



<p><strong>Google Chrome:</strong></p>



<ul class="wp-block-list">
<li>Google released a security update to fix exploitable zero-day vulnerability – <strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6554" target="_blank" rel="noreferrer noopener">CVE-2025-6554</a></strong></li>



<li>Updated version &#8211; 138.0.7204.100/.101 for Windows, Mac and 138.0.7204.100 for Linux.</li>



<li>No Android Security patches were released for July 2025.</li>



<li><strong><a href="https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop.html" target="_blank" rel="noreferrer noopener">Chrome release: July 8th, 2025</a></strong></li>
</ul>



<p><strong>Ivanti&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li>Ivanti has released updates for Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), Ivanti Endpoint Manager Mobile (EPMM), and Ivanti Endpoint Manager (EPM) which address <strong>6 medium</strong> severity vulnerabilities, and <strong>5 high</strong> severity vulnerabilities.</li>



<li><strong><a href="https://www.ivanti.com/blog/july-security-update-2025" target="_blank" rel="noreferrer noopener">July 2025 Security Update | Ivanti</a></strong></li>
</ul>



<p><strong>SAP&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li>In July 2025, SAP Security Patch Day saw the release of <strong><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html" target="_blank" rel="noreferrer noopener">27 new Security Notes</a> </strong>and 4 updates to previously released Security Notes.</li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong></h2>



<p>Software vulnerabilities are a leading cause of cyberattacks, with nearly one-third of breaches stemming from unpatched, known flaws.</p>



<p>Maintaining secure and up-to-date operating systems and applications is a complex, time-consuming task that often strains internal IT resources. Fortress SRM’s&nbsp;<strong>Vigilant Managed Cyber Hygiene&nbsp;</strong>with 24/7/365 U.S.-based Monitoring Service&nbsp;simplifies patch management by delivering automated, high-efficacy updates (97%+ success rate) for Microsoft and over 100 third-party applications. This includes critical security patches, OS upgrades, and key configuration updates—across all devices, on or off the network.</p>



<p>Our real-time reporting console offers full visibility into patch status and activity, helping organizations maintain a strong, proactive security posture.</p>



<p><strong>Ready to strengthen your cyber hygiene?</strong></p>



<p>Contact us at&nbsp;<a href="https://fortresssrm.com/contact-us/" target="_blank" rel="noreferrer noopener">Contact Us | Fortress Security Risk Management</a>&nbsp;(<a href="http://fortresssrm.com/" target="_blank" rel="noreferrer noopener">fortresssrm.com</a>) to learn how Fortress SRM can help support and enhance your organization’s cybersecurity strategy.</p>
<p>The post <a href="https://fortresssrm.com/security-threat-updates-july-2025/">Security &amp; Threat Updates – July 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Lessons from Sun Tzu’s “The Art of War”</title>
		<link>https://fortresssrm.com/cybersecurity-lessons-from-sun-tzus-the-art-of-war/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 21:31:00 +0000</pubDate>
				<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=514</guid>

					<description><![CDATA[<p>According to legend (or fact, depending on who you believe), Sun Tzu was a Chinese general, writer and strategist that lived in the 5th&#160;or 6th&#160;century B.C. He is credited as ...</p>
<p>The post <a href="https://fortresssrm.com/cybersecurity-lessons-from-sun-tzus-the-art-of-war/">Cybersecurity Lessons from Sun Tzu’s “The Art of War”</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>According to legend (or fact, depending on who you believe), Sun Tzu was a Chinese general, writer and strategist that lived in the 5<sup>th</sup>&nbsp;or 6<sup>th</sup>&nbsp;century B.C. He is credited as the author of&nbsp;<em>The Art of War</em>, a book on military strategy that has also been adapted for use in the business world.<br>&nbsp;<br>Many of the lessons in the book focus on alternatives to battle, such as using strategy, confusion and deceit, and most important to cybersecurity, thinking like the enemy, to understand and ultimately defeat an opponent.<br>&nbsp;<br>Here are several lessons from&nbsp;<em>The Art of War</em>&nbsp;and how they apply to cybersecurity.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>“The greatest victory is that which requires no battle.”&nbsp;</strong></p>
</blockquote>



<p>If you suffer a cyber-attack, you are engaged in battle. You will be fighting an unseen foe that has either stolen your intellectual property, trade secrets, sensitive customer data, or financial and banking information, or has locked you out of your IT systems and ransomed your data. Your choices: fight and regain control of your systems and data or surrender and pay a ransom.</p>



<p><strong>The Lesson: Being prepared against cyber-attacks is better than having to fight the battle because whether you fight or surrender, it is going to be expensive.</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>“In the midst of chaos, there is also opportunity.”</strong></p>
</blockquote>



<p>A cyber-attack produces chaos and shows the weak spots in your security, but in the heat of battle, there is no time for introspection. A better strategy is to simulate chaos with a “virtual cyber-attack.” These are called table top exercises, and they provide the opportunity to learn about security vulnerabilities and to make needed improvements. During these table top exercises, security problems can be identified and changes implemented, without the chaos of battle.</p>



<p><strong>The Lesson: Simulating a cyber-attack can expose security weaknesses so that changes can be implemented.</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>“Attack is the secret of defense; defense is the planning of an attack.”</strong></p>
</blockquote>



<p>“Don’t think like a castle, think like an invader.” In order to defeat a cybercriminal, you need to think like one. Every castle can be breached, just like every security system can be breached. Instead of focusing on what keeps you safe, focus on finding the weaknesses in your protection by thinking like a cybercriminal. They are relentless and will find any exploitable crack in your castle wall to gain entry. Be proactive: digital forensics with vulnerability scans and penetration testing can help you find it before they do.</p>



<p><strong>The Lesson: Thinking like the enemy allows you to see your cybersecurity through their eyes in order to find your weakness and fix it.</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>“If ignorant both of your enemy and yourself, you are certain to be in peril.”</strong></p>
</blockquote>



<p>This takes the last lesson to the extreme. Not understanding what security you have in place, what’s its strengths and weaknesses are, and not understanding how your enemy can (and will) attack you guarantees that eventually, you&nbsp;will&nbsp;suffer a security breach.</p>



<p><strong>The Lesson: It’s important to be aware of not just your enemy, but yourself as well. Your defenses help determine if your enemy will attack, and if they do, what offense they will use against you.</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>“Plan for what is difficult while it is easy, do what is great while it is small.”</strong></p>
</blockquote>



<p>With cybersecurity, the best plan is always action, not reaction. Your company should have an incident response plan in place, have developed and documented security policies, be constantly monitoring technology assets for suspicious activity, and respond to threats as they occur. Acting before a cyber-attack happens is more effective, less expensive, and easier to recover from than waiting until a breach happens to put a plan together.</p>



<p><strong>The Lesson: An ounce of prevention is better than a pound of cure.&nbsp;</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>“The opportunity to secure ourselves against defeat lies in our own hands.”</strong></p>
</blockquote>



<p>This lesson from&nbsp;<em>The Art of War</em>&nbsp;sums it up perfectly – it is up to each company, each organization, and each individual to protect themselves against cybercriminals because they are the enemy in the war on cybersecurity. If you’d like to have a confidential conversation with one of our cybersecurity experts to improve your security posture, simply complete the form below &#8211; we’re here to help!<br>&nbsp;<br>Are you confident in your current cyber risk strategy and execution?</p>



<p>Fortress helps mitigate cyber risk by helping organizations optimize the performance of their people, processes, and technology. Offering a robust co-managed solution to enhance an internal IT team’s capability, capacity, and focus, Fortress features a full suite of managed security services plus specialized services like M&amp;A cyber due diligence, insider threat detection, Cybersecurity-as-a-Service, and proactive digital forensics. Fortress supports companies with both domestic and international operations.</p>
<p>The post <a href="https://fortresssrm.com/cybersecurity-lessons-from-sun-tzus-the-art-of-war/">Cybersecurity Lessons from Sun Tzu’s “The Art of War”</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware: To Pay or Not to Pay? That Is the Question</title>
		<link>https://fortresssrm.com/ransomware-to-pay-or-not-to-pay-that-is-the-question/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 19:54:04 +0000</pubDate>
				<category><![CDATA[Incident Response]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=476</guid>

					<description><![CDATA[<p>It’s a big question for businesses hit by a ransomware attack: should we pay the ransom or not? Ransomware is malware that encrypts files on a device, making them inaccessible ...</p>
<p>The post <a href="https://fortresssrm.com/ransomware-to-pay-or-not-to-pay-that-is-the-question/">Ransomware: To Pay or Not to Pay? That Is the Question</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>It’s a big question for businesses hit by a ransomware attack: should we pay the ransom or not?<br><br>Ransomware is malware that encrypts files on a device, making them inaccessible and rendering the systems that use them inoperable. Cybercriminals demand a ransom in exchange for decrypting the files.<br><br>One of the most well-known ransomware attacks happened in May 2017, when <strong>Wannacry</strong> affected more than 300,000 computers across 150 countries. It targeted computers running the Microsoft Windows operating system and caused damages estimated to be in the hundreds of millions of dollars. Other widely publicized ransomware attacks have used <strong>Ryuk</strong>, which mainly targets large businesses and government agencies, <strong>Maze</strong>, which threatens to publish ransomed data on the internet if the victim fails to pay, and <strong>NetWalker</strong>, which targets remote workers, as well as government agencies and healthcare organizations.<br><br>What are the leading causes of ransomware infections? Phishing attacks are the most common, followed by lack of employee cybersecurity training; lack of, or outdated, security tools like antivirus or firewalls; malicious websites or malvertising; and end user error (Datto, 2018). Not surprisingly, 80% of this list is caused by human behavior. It is crucial that every organization stay vigilant with their security tools, but more importantly, train employees on how to avoid cybersecurity traps and be secure online.<br><br>Ransomware can have a disastrous effect on a business and leave it without the data and systems needed to maintain its operations. In recent years, ransomware criminals have added extortion to their demands, threatening to expose sensitive or proprietary data if a victim doesn’t pay the ransom, and publicly naming the company as having been hacked.<br><br>The dilemma for ransomware victims is weighing the cost of paying the ransom and the financial loss that comes along with it versus managing the lost productivity, extra IT costs, legal fees, network damage and potential reputational loss that not paying the ransom could create.<br><br>What is the average ransomware demanded? In 2020, the average of known ransoms was $178,000 (Coveware, 2020) and includes ransomware attacks on large companies which does push the average up. The average known ransom for smaller businesses is $5,900 (Datto, 2019). The largest published ransom demand of 2020 (there may be higher ransoms of which we are unaware) was made of a French construction firm and was 10 million euros, or $11.8 million (Cloudwards, 2020).<br><br>The costs to recover from a ransomware attack are significantly higher than the ransoms demanded. The average recovery cost was $1.45 million for companies that paid their attacker’s ransom, while those that didn’t pay spent only $730,000 to recover from the attack (Sophos, 2020). Only about 25% of ransomware victims made payments to their attackers (Sophos, 2020).<br><br>As you can see, ransomware attacks are expensive and they can be devastating. In May 2019, the city of Baltimore’s computer system was infected, and estimates put the recovery cost at over $18 million, although the cybercriminals only demanded $76,000 worth of Bitcoin. In 2018, the city of Atlanta spent over $17 million to recover from an attack that demanded $52,000 in Bitcoin.<br><br>Paying or not paying the ransom is a decision that each business must make for itself, but the <a href="https://www.fbi.gov/investigate/cyber" target="_blank" rel="noreferrer noopener">Federal Bureau of Investigation (FBI) </a>does not support paying a ransom because doing so doesn’t guarantee that the ransomed data will be decrypted or that your systems or data will no longer be compromised, and it encourages cybercriminals to target more victims. The <a href="https://www.cisa.gov/" target="_blank" rel="noreferrer noopener">Cybersecurity and Infrastructure Security Agency (CISA)</a> and <a href="https://www.cisecurity.org/ms-isac/" target="_blank" rel="noreferrer noopener">Multi-State Information Sharing and Analysis Center (MS-ISAC) </a>also do not recommend paying ransoms.<br><br>If your organization is hit with a ransomware attack, CISA recommends immediately: 1) determining which systems were impacted and isolate them, 2) if impacted devices cannot be disconnected from the network, power them down to stop the spread of the infection, 3) triage impacted systems for restoration and recovery. Next, engage internal and external stakeholders to mitigate, respond to, and recover from the incident.<br><br>In order to prevent a ransomware attack from happening to your organization and putting you in the uncomfortable position of having to decide to pay or not to pay a ransom, MCPc strongly suggests these activities to help keep you from ever having to make that decision:</p>



<ul class="wp-block-list"><li>Ensure that all user software is updated, and security patches are installed as soon as they are released (this includes operating systems and application software)</li><li>Frequently backup your data, and make sure there is a gap between it and the Internet, as it too can be ransomed</li><li>Keep your security tools like firewalls, antivirus, antispyware, and remote monitoring up to date with the latest versions</li><li>Periodically review and update your incident response (IR) plan, and test it against real-world threats</li><li>Stay current with cybersecurity news and learn lessons from other ransomware events</li></ul>



<p>Fortress Security Risk Management is a global data protection company that helps organizations protect themselves against ransomware attacks and provide incident response services to minimize the business disruption a cyber-attack can create. Our goal is to help every client achieve the highest degree of security and the least amount of risk their organization can afford, or what we call, SecurityCertainty<sup>&nbsp;SM</sup>.</p>
<p>The post <a href="https://fortresssrm.com/ransomware-to-pay-or-not-to-pay-that-is-the-question/">Ransomware: To Pay or Not to Pay? That Is the Question</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Managed Patching: What Is It and Do You Need It?</title>
		<link>https://fortresssrm.com/managed-patching-what-is-it-and-do-you-need-it/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 19:03:01 +0000</pubDate>
				<category><![CDATA[Managed Security]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=474</guid>

					<description><![CDATA[<p>Let’s be honest: applying software patches to computers, mobile devices, and servers is a hassle. Patching is something you know you should do but probably don’t because it requires a ...</p>
<p>The post <a href="https://fortresssrm.com/managed-patching-what-is-it-and-do-you-need-it/">Managed Patching: What Is It and Do You Need It?</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Let’s be honest: applying software patches to computers, mobile devices, and servers is a hassle. Patching is something you know you should do but probably don’t because it requires a lot of work. It’s the cybersecurity equivalent of brushing your teeth before bed or writing thank you notes. But unlike these two tongue-in-cheek examples, neglecting to update patches can allow hackers access to your business and its data, and that is not funny. Not even a little bit.</p>



<h2 class="wp-block-heading">First of all, what is managed patching?</h2>



<p>&nbsp;Managed patching is automating the process of delivering software patches to all devices in your technology environment and monitoring which devices have been patched and which haven’t.</p>



<h3 class="wp-block-heading">Let’s back up a bit – what is a software patch?</h3>



<p>A patch is software code that can be applied to installed software to correct an issue with the program. Almost all software programs require patches after the program has been released, and for many programs, multiple patches are released, sometimes for years after the initial release.<br>&nbsp;<br>There are several different types of patches: hotfixes, security patches, service packs, and unofficial patches. A hotfix is an update that fixes a bug or security issue and is urgently developed and released to limit the effect of the issue. Security patches fix vulnerabilities that hackers could use to gain access to your device and data. A service pack is a collection of updates, fixes, or software enhancements delivered as a single installable update. Unofficial patches are made by a third-party rather than the software publisher.</p>



<h3 class="wp-block-heading">Why is there a need for managed patching?</h3>



<p>A study by Bitdefender found that 64% of all unpatched vulnerabilities in the first six months of 2020 involved known bugs from 2018 and earlier – meaning that organizations were at risk from software and system weaknesses that could have easily been fixed – at least two years earlier!<br>&nbsp;<br>There are three main reasons for a need for managed patching: security, resources, and functionality.<br>&nbsp;<br>The most important reason for managed patching is security. Software vulnerabilities are a common access point for cybercriminals, and once they compromise a device, they have access to your network, technology systems, and your data. Security patches protect your network and infrastructure and reduce the number of access points to your systems. Automating the process helps ensure that all devices are updated and eliminates the element of human error.<br>&nbsp;<br>Next, few IT departments have the tools to know where every device they own is, let alone know which devices have which patches. The time and resources it would take to update every device with every available patch would quickly overwhelm even the most efficient IT team. Managed patching automates the process and keeps a detailed record of patching activities for auditing and regulatory purposes to meet the security compliance requirements of HIPAA, PCI-DSS, SOX, and NIST, to name just a few.<br>&nbsp;<br>Finally, managed patching ensures that the operating systems and application software that your business relies on functions correctly and contains all the new updates and enhancements the software publisher releases. These updates help keep your business competitive, so you don’t lose ground to competitors just because you’re using outdated software tools.</p>



<h3 class="wp-block-heading">But is managed patching really necessary?</h3>



<p>Patching software is involved and complicated, which is why recommended patches go uninstalled.<br>&nbsp;<br>Plus, network administrators often find it difficult (if not impossible) to ensure all devices and systems are adequately patched. Software patches are your first line of defense against cyber-attacks as they fix known weaknesses that could provide hackers unauthorized access to your devices (and network)<br>&nbsp;<br>Managed patching can help ensure that every device on your network is up to date with security patches and the latest software enhancements. Managed patching tools deploy patches quickly and efficiently and maintain records of which systems and devices have been updated, and which are still vulnerable.</p>



<p><strong>So, yes, managed patching is necessary.</strong></p>



<p>Fortress SRM is a global data protection company that helps organizations dramatically minimize their risk of disruption from unforeseen events like cyber-attacks and data breaches by providing industry-leading managed patching services. Our goal is to help every client improve their business resiliency and secure their future with the highest degree of security and the least amount of risk.</p>
<p>The post <a href="https://fortresssrm.com/managed-patching-what-is-it-and-do-you-need-it/">Managed Patching: What Is It and Do You Need It?</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Endpoint Detection &#038; Response Beats Antivirus. But Is It Enough?</title>
		<link>https://fortresssrm.com/endpoint-detection-response-beats-antivirus-but-is-it-enough/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 18:51:59 +0000</pubDate>
				<category><![CDATA[Managed Security]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=473</guid>

					<description><![CDATA[<p>Cybercrime used to be a problem only for large businesses, but those days are past. Small- and medium-sized businesses are attractive targets for cybercriminals, with SMBs accounting for 28% of ...</p>
<p>The post <a href="https://fortresssrm.com/endpoint-detection-response-beats-antivirus-but-is-it-enough/">Endpoint Detection &#038; Response Beats Antivirus. But Is It Enough?</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybercrime used to be a problem only for large businesses, but those days are past. Small- and medium-sized businesses are attractive targets for cybercriminals, with SMBs accounting for 28% of data breaches (Verizon, 2020), possibly because 23% of SMBs don’t use any type of endpoint security tools. What’s more frightening is 32% of SMBs that&nbsp;<strong>do</strong>&nbsp;use endpoint protection, use free, consumer-grade software. (BullGuard, 2020)<br><br>2020 provided a “perfect storm” of circumstances which has increased the frequency and severity of cyber-attacks on businesses of all sizes: a slowing global economy, growing awareness of unprotected data and suspect cybersecurity practices, and the rise of the remote workforce. &nbsp;<br><br>One technology used to mitigate cybercrime is Endpoint Detection and Response. But is it enough?</p>



<h2 class="wp-block-heading"><strong>What is EDR?</strong></h2>



<p>Endpoint Detection and Response (EDR) is a tool that is installed on an organization’s endpoints (laptops, desktops, tablets, smartphones, IoT devices) that continuously monitors behavioral data to detect and respond to security threats. EDR uses analytics to identify patterns and detect suspicious behavior, prevent malicious activity, and provide remediation to affected endpoints. Endpoint Detection and Response also collects and stores behavioral data for future analysis and reporting.</p>



<h2 class="wp-block-heading"><strong>Why is EDR Important?</strong></h2>



<p>EDR provides a more complete awareness of the endpoints in your technology environment than traditional security tools such as antivirus. Endpoint Detection and Response detects and protects against advanced forms of malware, credential and login theft, phishing attempts, and other advanced persistent threats. Whereas antivirus tools protect against known malware signatures, EDR is designed to recognize unknown types of malware based on their behavior, and then make decisions to prevent malicious actions.</p>



<h3 class="wp-block-heading"><strong>Limitations of Antivirus</strong></h3>



<p>Antivirus software is a security tool that relies on an always-growing database of malware signatures to provide protection, but this approach has several serious limitations:</p>



<ul class="wp-block-list"><li><strong><u>New or emerging threats</u></strong>:&nbsp;Antivirus cannot detect or prevent threats that do not match an existing signature or zero-day attacks. Even a small change to well-known malware can go undetected. Endpoint Detection and Response can detect new or unknown threats as well as insider threats, whether malicious or accidental.</li><li><strong><u>Inadequate insight</u></strong>: Antivirus is focused on prevention, and not on detection and investigation. EDR can detect unauthorized activity on your endpoints and within your network. EDR is also invaluable in forensic investigations and can show an attacker’s path of compromise, or “kill chain.”</li><li><strong><u>Credential theft</u></strong>:&nbsp;Compromised logins cannot be detected by antivirus tools. Endpoint Detection and Response relies on behavioral analysis and can detect when a hacker logs in from a different location or at suspicious times of the day.</li><li><strong><u>It’s not failsafe</u></strong>: Antivirus effectiveness has declined as cybercriminals have found new ways to compromise devices and systems, but many organizations still feel a false sense of security with the inadequate protection that antivirus provides.</li></ul>



<h3 class="wp-block-heading"><strong>Benefits of EDR</strong></h3>



<ul class="wp-block-list"><li><strong><u>Data Collection</u></strong>: EDR continuously collects and analyzes data on all endpoints, which helps identify threats in real-time, and facilitates investigations and incident response.</li><li><strong><u>Detects all endpoint threats</u></strong><strong>:&nbsp;</strong>Because EDR uses behavioral analytics instead of relying on known threat signatures, it can better identifypotential threats.</li><li><strong><u>Real-time response</u></strong>: Endpoint Detection and Response provides real-time response to potential security threats and isolates endpoints for immediate recovery, to clean and block suspicious files, and to take forensic snapshots for later analysis.</li><li><strong><u>Understand how safe you are</u></strong>:&nbsp;EDR helps create a clearer picture of the security status of an organization by identifying areas that may be vulnerable to attack and which endpoints are secure and uncompromised. Lack of visibility into security compromises is a large reason why many organizations struggle to understand the scope and impact of a cyber-attack.</li><li><strong><u>Regulatory compliance</u></strong>:&nbsp;Endpoint Detection and Response also allows a business to report on its security compliance status for SOX, HIPAA, GDPR, etc.</li><li><strong><u>Compatibility with other security tools</u></strong>: EDR works in concert with other security tools such as SIEM, firewalls, etc., to provide layered cybersecurity.</li></ul>



<h3 class="wp-block-heading"><strong>Considerations of EDR</strong></h3>



<p>Endpoint Detection and Response is not a one-and-done security tool; it is most effective when combined with other security strategies and managed by security experts.</p>



<ul class="wp-block-list"><li><strong><u>EDR creates more data</u></strong>: More data means more analysis; and that requires trained security specialists, additional storage, time, and money.</li><li><strong><u>Threats will still exist</u></strong>: No security tool provides 100% protection, not even EDR.</li><li><strong><u>Will EDR cover everything?</u></strong>: EDR can be installed on servers and endpoints alike, but make sure it will work with all of your IoT devices or older operating systems.&nbsp;</li></ul>



<h2 class="wp-block-heading"><strong>Endpoints Are Crucial – Make Sure They are Protected</strong></h2>



<p>Endpoints are a large attack vector, and with work-from-home and remote workforces increasing, Endpoint Detection and Response is crucial to limiting the security risk of an organization’s endpoints. It is a cybersecurity must-have for any company facing security threats – which is&nbsp;<strong>every</strong>&nbsp;company!<br><br>Fortress Security Risk Management is a global data protection company that helps organizations dramatically minimize their risk of disruption from unforeseen events like cyber-attacks and data breaches by providing industry-best EDR services, as well as other cybersecurity services from our 24/7 Security Operations Center (SOC). Our goal is to help every client secure their future with the highest degree of security and the least amount of risk.</p>
<p>The post <a href="https://fortresssrm.com/endpoint-detection-response-beats-antivirus-but-is-it-enough/">Endpoint Detection &#038; Response Beats Antivirus. But Is It Enough?</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Football Can Teach Us About Cybersecurity</title>
		<link>https://fortresssrm.com/what-football-can-teach-us-about-cybersecurity/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 18:10:10 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=472</guid>

					<description><![CDATA[<p>Cybersecurity and football have many things in common, and football can teach us a lot about how to approach cybersecurity. Football is a very adversarial sport. One side is trying ...</p>
<p>The post <a href="https://fortresssrm.com/what-football-can-teach-us-about-cybersecurity/">What Football Can Teach Us About Cybersecurity</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity and football have many things in common, and football can teach us a lot about how to approach cybersecurity.<br><br>Football is a very adversarial sport. One side is trying to score, and the other side is trying to prevent that from happening. Cybersecurity is the same; hackers are always on the offensive, trying to get into your technology system and “score” data, access, or information, while information security teams are always playing defense to keep that from happening.<br><br>Football can teach several lessons about cybersecurity that we are calling “The Five Ps.”</p>



<h2 class="wp-block-heading"><strong>Planning</strong></h2>



<p>Football is a sport that is based on planning. Instead of it being a free-flowing, fluid game like soccer or basketball, it is a series of orchestrated plays that are chosen based on game circumstances.&nbsp;<br><br>As anyone who has ever tried to pick which team will win on any given weekend can attest, the best team doesn’t always win. Experts believe that most of a team’s success is a result of the planning and strategizing that goes into every game, because when the game is being played, the winning team is usually the one that better executes its game plan.<br><br>For example, Team A knows that Team B has a young and inexperienced defensive secondary, so Team A’s game plan includes lots of long, downfield plays to exploit the defense’s weakness. In cybersecurity, Company A is continually updating its cybersecurity plan based on the tactic’s cybercriminals are using to gain access to companies, because unlike football, you never know which opponent you will be facing on any given day.</p>



<h2 class="wp-block-heading"><strong>Practice</strong></h2>



<p>“Practice makes perfect.” Sure, it’s an unimaginative phrase, but it’s also time-tested and true.<br><br>Practicing plays over and over creates a pattern in the brain and the body where the actions and motions become instinctual. This “muscle memory” means that the play can be repeated over and over with the same results.<br><br>Practice is also crucial to good cybersecurity. Breaches and security incursions should be practiced with regularity and moderated by someone that understands security and can “grade” the participants after the exercise to improve their readiness skills. Regular practice with staged security issues also keeps security and IT team members sharp because they never know which type of incident will be practiced.<br><br>Practice is all about doing better today than yesterday, because much like football players, cybersecurity always need to improve because the cybercriminal competition is always improving.</p>



<p>It is also important to remember that practicing cybersecurity does not take-away from everyday work, it is a crucial part of the job, it is as important as new technology installations and integrations. Practicing security threats and simulating cyber-attacks should be part of every IT team’s responsibility.</p>



<h2 class="wp-block-heading"><strong>Precision</strong></h2>



<p>Precision means putting focus on the right things. Practice is important, but it’s just as important to practice effectively. Reinforcing bad habits or practicing the wrong things doesn’t accomplish anything except waste time and effort. A football team that practices running plays all week long and then decides on a pass-first game plan will have wasted their entire week of practice and will most certainly be ineffective on game day.<br><br>For a cybersecurity team, practicing the wrong things wastes time and increases costs. Two critical aspects of cyber training are to:</p>



<ul class="wp-block-list"><li><strong>Align the right training for the right roles</strong>&nbsp;– in football, kickers spend their time practicing field goals and kickoffs and don’t participate in blocking drills. Your security team’s training should work the same; your Help Desk Analyst isn’t going to be your Cyber Forensics expert on game day. Both play a vital role in getting your organization back up and running and both should be prepared for their own individual role that day. One will help the company get back up and running, while the other determines the cause.<br></li><li><strong>Manage training effectively</strong>&nbsp;– this means that some team members might use self-guided online training modules, some might attend a seminar, and others might take classes to attain certifications.</li></ul>



<h2 class="wp-block-heading"><strong>Players</strong></h2>



<p>Coaches coach and players play. In football, it’s important for coaches to understand their players and where they fit on the team based on the unique skills they possess.<br><br>A player that was a tight end in college might be better suited to be a wide receiver role in the NFL, based on his size and speed. A lineman might not play is his rookie year until he adds weight and muscle and learns the position from a more experienced teammate.<br><br>In cybersecurity, leaders must assess and evaluate their teams, understand the skill and knowledge they have (and which they lack), and provide training appropriate for the role that will improve proficiency to the skill level required for the role. It&#8217;s also important for team members to understand where they fit on the team by understanding their roles and how they contribute to the security of the organization.</p>



<p>It’s important to note that players aren’t always people. Cybersecurity relies on people, process, and technology, and all three must work together. It’s crucial that your processes and technology also be appropriate for your security needs and that their fit into your team and your security game plan.</p>



<h2 class="wp-block-heading"><strong>Performance</strong></h2>



<p>Athletes and coaches understand that cross-training improves overall fitness and prevents injuries, while at the same time expanding their abilities. A lineman that only lifts weights might improve upper body strength but might have little stamina. A coach can vary the player’s training to provide more balanced conditioning, so adding running to the lineman’s workout routine can add stamina and improve overall cardiovascular performance.<br><br>Cross-training in cybersecurity makes team members perform better. Security team members that have a broader understanding of the organization’s security playbook increase the teams’ agility and ability to respond to a security incident. In some cases, it allows team members to step in and perform in other roles, adding flexibility to the team.&nbsp;<br><br>Focusing on continuous assessment and training can create a cybersecurity team that is trained in modern security methodologies and tools. Plus, the business can draft new talent with skills missing from the team or to augment existing strengths.<br><br>Cybersecurity preparation is a vital function for every organization. Proper&nbsp;<strong>Planning</strong>, effective&nbsp;<strong>Practices</strong>&nbsp;that focus on&nbsp;<strong>Precision</strong>, training your&nbsp;<strong>Players</strong>, and continually improving your&nbsp;<strong>Performance</strong>&nbsp;can help your players and organization be ready for game day.<br><br>Fortress Security Risk Management is a global data protection company that helps organizations dramatically minimize their risk of disruption from unforeseen events like cyber-attacks and data breaches by providing industry-best cybersecurity services. Our goal is to help every client secure their future with the highest degree of security and the least amount of risk.</p>
<p>The post <a href="https://fortresssrm.com/what-football-can-teach-us-about-cybersecurity/">What Football Can Teach Us About Cybersecurity</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Hall of Shame</title>
		<link>https://fortresssrm.com/cybersecurity-hall-of-shame/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Sat, 22 May 2021 17:17:27 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Infographics]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?post_type=infographic&#038;p=608</guid>

					<description><![CDATA[<p>Learning from others&#8217; mistakes is certainly less painful than making the mistakes yourself. We hope you&#8217;re never on this list: &#8220;The 5 Biggest Cybersecurity Mistakes Organizations Make.&#8221;</p>
<p>The post <a href="https://fortresssrm.com/cybersecurity-hall-of-shame/">Cybersecurity Hall of Shame</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Learning from others&#8217; mistakes is certainly less painful than making the mistakes yourself. We hope you&#8217;re never on this list: &#8220;The 5 Biggest Cybersecurity Mistakes Organizations Make.&#8221;</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="489" height="2560" src="https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_HallofShame_IG-scaled.jpg" alt="Cybersecurity Hall of Shame Infographic" class="wp-image-566" srcset="https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_HallofShame_IG-scaled.jpg 489w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_HallofShame_IG-768x4022.jpg 768w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_HallofShame_IG-391x2048.jpg 391w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_HallofShame_IG-100x524.jpg 100w" sizes="(max-width: 489px) 100vw, 489px" /></figure>
<p>The post <a href="https://fortresssrm.com/cybersecurity-hall-of-shame/">Cybersecurity Hall of Shame</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The IT and Business Nightmare: Patch Management</title>
		<link>https://fortresssrm.com/the-it-and-business-nightmare-patch-management/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Wed, 03 Mar 2021 18:08:08 +0000</pubDate>
				<category><![CDATA[Infographics]]></category>
		<category><![CDATA[Managed Security]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?post_type=infographic&#038;p=593</guid>

					<description><![CDATA[<p>Software patches protect your network and infrastructure but they are an IT and business resource nightmare.</p>
<p>The post <a href="https://fortresssrm.com/the-it-and-business-nightmare-patch-management/">The IT and Business Nightmare: Patch Management</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Software patches protect your network and infrastructure but they are an IT and business resource nightmare.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="699" height="2560" src="https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-scaled.jpg" alt="Patch Management Infographic" class="wp-image-570" srcset="https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-scaled.jpg 699w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-82x300.jpg 82w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-280x1024.jpg 280w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-768x2813.jpg 768w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-419x1536.jpg 419w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-559x2048.jpg 559w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_Patch_Management_IG-100x366.jpg 100w" sizes="(max-width: 699px) 100vw, 699px" /></figure>
<p>The post <a href="https://fortresssrm.com/the-it-and-business-nightmare-patch-management/">The IT and Business Nightmare: Patch Management</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Resiliency is Business Resiliency</title>
		<link>https://fortresssrm.com/cyber-resiliency-is-business-resiliency/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 19:02:00 +0000</pubDate>
				<category><![CDATA[Highlight]]></category>
		<category><![CDATA[Incident Prevention]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=469</guid>

					<description><![CDATA[<p>Cyber resiliency is an organization’s ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on cybersecurity resources. This standard definition of cyber resilience was ...</p>
<p>The post <a href="https://fortresssrm.com/cyber-resiliency-is-business-resiliency/">Cyber Resiliency is Business Resiliency</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cyber resiliency is an organization’s ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on cybersecurity resources. This standard definition of cyber resilience was created by the <a href="https://www.nist.gov/" target="_blank" rel="noreferrer noopener">National Institute of Standards and Technology</a> and we believe it is spot-on.<br><br>Cyber resiliency is also business resiliency. A business that is cyber resilient can defend itself against cyber-attacks, limit the negative impact a security incident can have, and ensure business continuity and uninterrupted operation during and after the attack. Being cyber resilient also helps organizations withstand and recover from other business interruptions, such as natural disasters, hardware failures, data loss, and power outages.<br><br>There is a distinct difference between cybersecurity and cyber resiliency. Cybersecurity is preventing a cyber-attack using tools such as endpoint detection and response (EDR), firewalls, malware detection software, and improving security behaviors with employee anti-phishing email training and timely security patch updates.<br><br>Being cyber resilient is letting go of the belief that an organization can create an impenetrable barrier between it and cyber criminals. Instead, cyber resiliency assumes that attacks will happen, and operations will be disrupted so safety precautions must be implemented to respond to, and recover from, cyber-attacks.<br><br>A cyber and business resiliency mindset seeks to identify the parts of a business that can be disrupted, and once identified, is focused on limiting the impact of a disruption. As an example, if a power outage occurs, are there data backups in place for critical and non-critical business systems? How soon can systems be restored? Are there multiple backups in different locations in the event of a natural disaster?<br><br>Not until measures are put in place to minimize the impact of disruptions can a business consider itself resilient.<br><br>There are three main elements of cyber resiliency: <strong>Cybersecurity Protection</strong>, <strong>Continuation of Normal Business</strong>, and <strong>Adaptability</strong>.</p>



<ul class="wp-block-list"><li><strong>Cybersecurity Protection</strong>&nbsp;is putting security measures and tools in place to prevent unauthorized access to your systems and network. It includes using EDR, firewalls, VPNs, and staff training to defend against cyber-attacks.<br></li><li><strong>Continuation of Normal Business</strong>&nbsp;is the point at which an organization is operating normally&nbsp;after&nbsp;a security incident or can continue operating&nbsp;during&nbsp;an incident. This includes the time it takes to restore all systems from backups.<br></li><li><strong>Adaptability&nbsp;</strong>refers to how easily the organization can defend against ever evolving and changing cyber-attacks. The more adaptable an organization is, the more cyber resilient it is.</li></ul>



<p>Achieving cyber resiliency is like seeing a city on a map – you know where it is, but the important question is, how do you get there?<br><br>We hope these&nbsp;<strong>6 Steps to Cyber Resiliency</strong>&nbsp;can help your organization become more business resilient:</p>



<ol class="wp-block-list"><li><strong>Plan</strong><br>Create an incident response team and response plan, test your security, and practice, practice, practice what to do in the event of a security incident.<br></li><li><strong>Protect</strong><br>Put cybersecurity tools in place, such as EDR, SIEM, and firewalls to create a defense system that can withstand most cyber threats your organization may face.<br></li><li><strong>Defend</strong><br>With an active cybersecurity framework established, your security tools can defend your business against most security threats and disruptive events and allow you to keep operating during an incident.<br></li><li><strong>Restore</strong><br>Have a plan and safety measures in place to restore your critical and non-critical business systems from on-site, offsite, or cloud-based data backups.<br></li><li><strong>Observe &amp; Analyze</strong><br>Implement software tools that report, log, and repel cyber treats in real-time. These tools rely on machine learning, artificial intelligence, and automated threat hunting and can learn and adapt to prevent future cyber threats.<br></li><li><strong>Adapt</strong><br>Always assess your threat-readiness and cybersecurity protection to maintain normal operations now, and in the future.</li></ol>



<p>Cyber resiliency takes work but is essential for business survival in the information age. It’s also important to know that it’s OK to ask for help!<br><br>Fortress Security Risk Management is a global data protection company that helps organizations dramatically minimize their risk of disruption from unforeseen events like cyber-attacks and data breaches by providing industry-best cybersecurity services to prepare your organization to be cyber resilient. Our goal is to help every client secure their future with the highest degree of security and the least amount of risk.</p>
<p>The post <a href="https://fortresssrm.com/cyber-resiliency-is-business-resiliency/">Cyber Resiliency is Business Resiliency</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Cyber Threat Universe</title>
		<link>https://fortresssrm.com/the-cyber-threat-universe/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Thu, 14 Jan 2021 18:05:28 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Infographics]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?post_type=infographic&#038;p=590</guid>

					<description><![CDATA[<p>Cyberspace can be a dangerous place! Understanding the cyber threats that fill our universe can help you avoid them.</p>
<p>The post <a href="https://fortresssrm.com/the-cyber-threat-universe/">The Cyber Threat Universe</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cyberspace can be a dangerous place! Understanding the cyber threats that fill our universe can help you avoid them.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="2400" height="2400" src="https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG.jpg" alt="The Cyber Threat Universe Infographic" class="wp-image-573" srcset="https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG.jpg 2400w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-300x300.jpg 300w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-1024x1024.jpg 1024w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-150x150.jpg 150w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-768x768.jpg 768w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-1536x1536.jpg 1536w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-2048x2048.jpg 2048w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-100x100.jpg 100w, https://fortresssrm.com/wp-content/uploads/2021/06/FSRM_The_Cyber_Threat_Universe_IG-1900x1900.jpg 1900w" sizes="(max-width: 2400px) 100vw, 2400px" /></figure>
<p>The post <a href="https://fortresssrm.com/the-cyber-threat-universe/">The Cyber Threat Universe</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
