<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TransAccel Group &#187; Security Awareness</title>
	<atom:link href="http://transaccelgroup.com/tag/security-awareness/feed/" rel="self" type="application/rss+xml" />
	<link>http://transaccelgroup.com</link>
	<description>Improving IT Processes &#38; Services</description>
	<lastBuildDate>Tue, 03 Jul 2018 13:13:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>Are you too focused on the technical aspects of cyber security?</title>
		<link>http://transaccelgroup.com/2015/04/23/are-you-too-focused-on-the-technical-aspects-of-cyber-security-see-more-at-httpwww-transaccelgroup-comblog20150423are-you-too-focused-on-the-technical-aspects-of-cyber-securitysthash-v5x/</link>
		<comments>http://transaccelgroup.com/2015/04/23/are-you-too-focused-on-the-technical-aspects-of-cyber-security-see-more-at-httpwww-transaccelgroup-comblog20150423are-you-too-focused-on-the-technical-aspects-of-cyber-securitysthash-v5x/#comments</comments>
		<pubDate>Thu, 23 Apr 2015 21:30:30 +0000</pubDate>
		<dc:creator><![CDATA[Greg Scott]]></dc:creator>
				<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Communication and Change Management]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=5403</guid>
		<description><![CDATA[When someone mentions information security, invariably thoughts go to technical aspects such as firewalls, routers, wireless access points and how to set those devices up—or to physical aspects such as locks, security guards and fences. These are the technical and physical controls that usually comprise our understanding of how to achieve the best level of security possible. But controls for information security fall into three main categories: the physical and technical—which we’ve already described—and the administrative, which often receives short shrift. Why? My guess is that administrative controls are considered “soft,” focusing on management and training, and it’s pretty enticing to think that technical controls and physical controls will suffice for cyber security defense. Not a good idea, says Art Gilliland, senior vice president and general manager for Hewlett-Packard’s software enterprise security products in a recent issue of Computer World. “…businesses and government agencies often focus on the next “silver bullet” product, unaware that most cybersecurity problems stem from flawed procedures and human error…invest in your people and process.” In the broader world of business, success depends on the correct balance of the three main pillars: people, process, and technology. Within information security, are we creating a three-legged stool with one leg (technology) longer than the others? That can’t be good. Technology is an important piece of your arsenal, but insufficient by itself. Having sound policies, defining clear role-based processes and procedures, and providing communications and training for key stakeholders (which may include every employee) will create balance for the three-legged stool of information security. Policies and processes might sound like management overhead, but any organization desiring to provide consistent goods and services must have consistently applied policies and processes—i.e., CMMI, but that’s a topic [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>When someone mentions information security, invariably thoughts go to technical aspects such as firewalls, routers, wireless access points and how to set those devices up—or to physical aspects such as locks, security guards and fences. These are the technical and physical controls that usually comprise our understanding of how to achieve the best level of security possible. But controls for information security fall into three main categories: the physical and technical—which we’ve already described—and the administrative, which often receives short shrift. Why?</p>
<p>My guess is that administrative controls are considered “soft,” focusing on management and training, and it’s pretty enticing to think that technical controls and physical controls will suffice for cyber security defense. Not a good idea, says Art Gilliland, senior vice president and general manager for Hewlett-Packard’s software enterprise security products in a recent issue of Computer World.</p>
<p>“…businesses and government agencies often focus on the next “silver bullet” product, unaware that most cybersecurity problems stem from flawed procedures and human error…invest in your people and process.”</p>
<p>In the broader world of business, success depends on the correct balance of the three main pillars: people, process, and technology. Within information security, are we creating a three-legged stool with one leg (technology) longer than the others? That can’t be good. Technology is an important piece of your arsenal, but insufficient by itself. Having sound policies, defining clear role-based processes and procedures, and providing communications and training for key stakeholders (which may include every employee) will create balance for the three-legged stool of information security. Policies and processes might sound like management overhead, but any organization desiring to provide consistent goods and services must have consistently applied policies and processes—i.e., CMMI, but that’s a topic for another blog.</p>
<p>Unfortunately, many IT areas don’t give communications and change management its proper due, which is why we focus on those areas as part of all of our client engagements. Information Security user awareness and training helps create a faction of employees who understand that they can be either a vehicle for threat actors to enter your environment, or sentries at the gate, raising an alert when something looks suspicious.</p>
<p>A one-legged stool is going to have you end up on the floor. While you are focusing on technical and physical security, your adversaries are busy figuring out how to leverage your employees to breach your environment. Remember, three legs: People, Process, Technology. Don’t shortcut people and process in cyber security.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2015/04/23/are-you-too-focused-on-the-technical-aspects-of-cyber-security-see-more-at-httpwww-transaccelgroup-comblog20150423are-you-too-focused-on-the-technical-aspects-of-cyber-securitysthash-v5x/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is Your Head in the Cyber Security Sand?</title>
		<link>http://transaccelgroup.com/2015/04/09/is-your-head-in-the-cyber-security-sand/</link>
		<comments>http://transaccelgroup.com/2015/04/09/is-your-head-in-the-cyber-security-sand/#comments</comments>
		<pubDate>Thu, 09 Apr 2015 21:36:29 +0000</pubDate>
		<dc:creator><![CDATA[Greg Scott]]></dc:creator>
				<category><![CDATA[security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Due Diligence]]></category>
		<category><![CDATA[Security Strategy]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=5407</guid>
		<description><![CDATA[“We started as a relatively small company. Through success and internal growth along with some acquisitions, we are now a medium- sized company using the same policies and processes as when we first started.” Does this sound familiar? If so, take solace in knowing that you are not alone, but things have to change. For many companies, growth has outpaced their policies and processes, which can be a risky situation, especially in cyber security. In information security, due care means “acting responsibly and doing the right things.” While information security is a very complex field, there are certain basic building blocks that must be in place for every company. Ask yourself: Do you know your company’s most important assets, where they are located, and how they are protected? Do your employees understand their role in information security? Do you understand the major vulnerabilities within your company? Do you know the major threats and threat agents to your company / industry? Do you know how your company would respond in the event of a cyber attack? When the topic of cyber security comes up, most people think about firewalls, intrusion protection/detection systems, and other technical solutions. While these are inevitably part of the solution space, if you are hesitant or unsure of the answers to any of the questions listed above, you could be negligent in providing “due care” for your company. You probably understand the things that need to be done to make your company secure from an information perspective. Nevertheless, not taking action—even by doing something as small as raising the issue with your leadership—can be construed as not “acting responsibly.” Knowing what to do and actually doing it are two completely different things. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>“We started as a relatively small company. Through success and internal growth along with some acquisitions, we are now a medium- sized company using the same policies and processes as when we first started.”</p>
<p>Does this sound familiar?</p>
<p>If so, take solace in knowing that you are not alone, but things have to change. For many companies, growth has outpaced their policies and processes, which can be a risky situation, especially in cyber security.</p>
<p>In information security, due care means “acting responsibly and doing the right things.” While information security is a very complex field, there are certain basic building blocks that must be in place for every company.</p>
<p>Ask yourself:</p>
<p>Do you know your company’s most important assets, where they are located, and how they are protected?<br />
Do your employees understand their role in information security?<br />
Do you understand the major vulnerabilities within your company?<br />
Do you know the major threats and threat agents to your company / industry?<br />
Do you know how your company would respond in the event of a cyber attack?<br />
When the topic of cyber security comes up, most people think about firewalls, intrusion protection/detection systems, and other technical solutions. While these are inevitably part of the solution space, if you are hesitant or unsure of the answers to any of the questions listed above, you could be negligent in providing “due care” for your company.</p>
<p>You probably understand the things that need to be done to make your company secure from an information perspective. Nevertheless, not taking action—even by doing something as small as raising the issue with your leadership—can be construed as not “acting responsibly.” Knowing what to do and actually doing it are two completely different things. There will always be the “hot,” critical project that needs attention, but ignoring what you know to be absolutely necessary is comparable to a “dereliction of duty.” Taking key resources away from information security operational activities to do project work is shortsighted and negligent, and puts you at risk as a company.</p>
<p>Don’t wait any longer. Now is the time to act and provide your company the level of due care that is necessary and expected.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2015/04/09/is-your-head-in-the-cyber-security-sand/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
