Cyber Security Awareness

SECURING THE PHARMA MANUFACTURING SUPPLY CHAIN

SECURING THE PHARMA MANUFACTURING SUPPLY CHAIN

As a Pharma Manufacturer, did you know your supply chain could significantly increase your organization’s risk for cyber-attack? Read the 3 minute Blog post by JSCM Group to find out how to protect your organization.

New Patch Blocks Windows RPC Vulnerability

Thursday, April 21, 2022—In their “April 2022 Patch Tuesday”, Microsoft released a fix for the new Windows CVE-2022-26809 vulnerability. Rated as “Critical”, the 26809 vulnerability could validate unauthorized remote code execution through Microsoft Remote Procedure Call (RPC) communication protocol.

The Passion for Cyber Security – Part 3

The Passion for Cyber Security – Part 3

I’ve spent the last month thinking hard about my time so far in cyber security, and it has brought up a lot of good memories. The biggest thing that has stuck with me, and the thing I will leave you all with, is the top reason I love this career: my coworkers.

The Passion for Cyber Security – Part 2

The Passion for Cyber Security – Part 2

As I have reflected on my time at JSCM Group and my career in cyber security, I have done a lot of thinking on what makes me want to come to work every day. One of the big things that makes me appreciate what I do is that each day is different than the one before, and that I’m constantly having to push myself to learn more.

The Passion for Cyber Security

The Passion for Cyber Security

During this month we will be posting blog posts from the perspectives of the women in our organization about why we love this field. Our goal is to shed light on what we do every day, and hopefully make someone out there see that this might just be the place for them. We are nothing if not passionate about what we do, and we want to share that with anyone that will listen.

Benefits of Hiring a Cyber Security Specialist

Benefits of Hiring a Cyber Security Specialist

When you have a need for a cyber security firm, and everyone has a need, do not look to companies that claim to “do it all” or “also do security”. The talents are not the same. You need people that will be completely focused in securing your infrastructure and working with your other IT teams to help accomplish that goal.

Evaluating Cyber Security in Your Supply Chain

Evaluating Cyber Security in Your Supply Chain

Many organizations fail to evaluate the security of their supply chain and properly identify the risks they face that could cause mass interruption to their operations. We consider this a major oversight as recent news articles support.

Brand (blind) Loyalty

Brand (blind) Loyalty

There is not a single network that I can think of in the last several years that we designed and deployed that is 100% from one hardware manufacturer. And there is not one network that I can think of that has the same brand on the hardware side as the software side.

Advocating for Liability Protections

Advocating for Liability Protections

With internet connections to our businesses being open to the world, we lack the ability to control the inbound traffic. This is because we do not have control over what network connections are routed to us from our internet service provider.

6 Tips for Increasing Your Online Privacy

6 Tips for Increasing Your Online Privacy

For individuals inside of an organization, maintaining your privacy is one key to becoming more secure. Organizations need to be very cautious with what data they inadvertently leak into the public.

Opening the Door for Cyber Crime

Opening the Door for Cyber Crime

Currently, various Governments across the world are making determinations over what types of businesses should remain open and which ones should close. Millions and millions of people will lose their jobs and money will become a desperate necessity. Many networks will be left unguarded; or merely guarded by automated controls, only to alert administrators in the event of an incident. Unfortunately, these automated controls don’t always work.

DNS-over-HTTPS

DNS-over-HTTPS

While DoH is designed to add security to Internet traffic, there are also significant concerns with this feature being automatically implemented. Its implementation may be beneficial for personal use, but will cause significant issues for organizations and their networks.