Axenic is proud to announce our new product offering which will substantially improve security at government agencies!
Government agencies have been telling us for years that they have struggled to implement the cable colour standards in the NZISM. Hampered by the fact that they don’t own the data centres, that it is hard to discover which cables are carrying which traffic, and that many of the data centres are overseas – agencies have given up. No longer!
Take a moment to imagine a world with gender equality. No bias, no stereotypes, no discrimination. This year’s International Women’s Day focuses on encouraging people to overcome gender biases towards women. We are trying to eliminate gender bias by showing our support and encouraging diversity. We’re very fortunate that our team here at Axenic is made up of a number of passionate and experienced women who are all outstanding professionals in their field. In support and recognition of International Women’s Day this year, we would like to take the opportunity to introduce you to them.
When using devices and online services, always use modern, convenient and strong access controls. Fingerprint sensors are brilliant for controlling access to personal devices, a good password manager makes creating and remembering passwords a breeze, and adding multi-factor authentication is the best approach for protecting the accounts you really care about.
In the information security industry, we are provided plenty of top-lists and guidance that help us identify information security threats, and determine security controls to mitigate these threats.
This is the fourth article in a series that aim to help organisations build and maintain their information security incident management and response capability.
In the previous article I provided a bird’s eye view of the standard incident handling process. As noted previously, the incident handling process is triggered either by detecting or reporting security events. A number of security professionals believe that detecting an incident means looking for failure logs such as failed login, failed resource access etc.
This is the third article in a series that aims to help organisations build and maintain their information security incident management and response capability.
Before getting “into the weeds” of an incident handling process, it is useful to have a bird’s eye view of what it looks like. In this article I will provide you with an overview of the process and a brief description of each of the process steps. While incident handling is widely perceived to be a technical process, only some of its steps require technical knowledge. In reality, a lot of incidents do not require any technical knowledge to handle them. For example, incidents that relate to policy violations, physical security breaches, loss of computing devices, etc.