The Human Factor and Cybersecurity

BLUF Given a limited budget, the more important factor to focus on would be training. Allocating time to limit possible human error eliminates any risk of fund loss due to human error. Then, focus on acquiring the most well-rounded, layered, and multi-use software that covers the most well-known risks. Risk Assessment The first step would…

SCADA Systems

BLUF SCADA Systems are a collection of hardware and software technology that is meant to process and sort through real-time operational technologies. For example, things like power grids, water treatment plants, transportation networks, and more. It does not control any of that data, it merely acts as a processor. Vulnerabilities Some of the main vulnerabilities…

The CIA Triad: Availability vs. Authentication

BLUF The CIA Triad is a set of guidelines that have evolved over time into the standard for policies concerning information security. CIA stands for confidentiality, integrity, and availability. Confidentiality stands for the privacy of the information. Integrity involves how trustworthy the systems are that are in place to protect the information. Availability is how…

Other Components of Business Operation

BLUF The main components of business operations typically lack any mention of technology or cybersecurity. This leaves out many important and hidden works of many departments keeping the company running and safe from hacks and cyber attacks. IT and Cybersecurity (Technology) should be recognized as a main and important component of business operations.  Other Components…