Human Error and Corrective Protocols as a Chief Information Security Officer

Humans are the root cause of a majority of cybersecurity risks and threats. Computers are controlled by an authorized user or an individual with access to a system.❖ Human error plays a role in vulnerability along with social engineering manipulating the human thought process.❖ Simple and easy to learn training regimen to understand social engineering…

If I Were a CISO

The chief information security officer(CISO) is a senior cyber security personnel with a high level of responsibilities when it comes to enforcing preventative and redundancies for ensuring the availability of systems. A public traded company is a company that retails shares of stocks. A company that shares stocks are large financial target for criminal syndicates….

Components of a Business and IT

A business is comprised of many key roles such as: CEO, operations, marketing, sales, finance, and HR. All roles are uniquely tasked to support a business in different sectors such as employment and economy. Another role that is significant in supporting a business is the training and development teams. Training and development ensure that up…

Importance of NIST Framework

The National Institution of Standards and Technology (NIST) were tasked to improve cybersecurity guidelines amidst countless risks that affect American organization’s finances and workflow.  The NIST guidelines address areas to identify and prevent against risks that is suitable for the organization’s purpose.  Although, to the article, Framework for Improving Critical Infrastructure Cybersecurity, “Organizations will continue to…