Blog Posts

What governmental agencies help if I am hacked?

If a small business falls victim to a cyber attack, there are a number of governmental agencies that can provide assistance. The primary agency responsible for investigating and responding to cyber incidents is the Federal Bureau of Investigation (FBI). The FBI's Cyber Division is responsible for investigating cyber-based terrorism, espionage, and computer crime. They have a number of field offices located throughout the United States, and they also have a number of partnerships with state and local law enforcement agencies.

Read More

What goes into a Security Event Playbook?

A security event playbook is a comprehensive document that outlines the procedures and protocols that should be followed in the event of a security incident. It is a critical tool for organizations of all sizes and industries, as it helps to ensure that all relevant personnel are aware of the steps they should take to minimize the impact of a security incident.

Read More

What is a Security Event Playbook?

A security event playbook is a document that outlines the procedures and protocols that a company should follow in the event of a security incident. It is a set of guidelines that detail the steps that should be taken to detect, respond to, and recover from a security event, such as a cyber attack, data breach, or other security incident. This document is designed to be used by an organization's security team and other relevant personnel in the event of a security incident.

Read More

Breach Notification Requirements

When it comes to cybersecurity, one of the most important things for small businesses to understand is their obligation to notify individuals and relevant authorities in the event of a data breach. This process, known as breach notification, is a legal requirement for many businesses, and failure to comply can result in significant fines and penalties. In this blog post, we'll take a detailed look at breach notification requirements for small businesses, including the types of notifications that must be sent, the common roles involved in the process, and the specific rules and regulations that apply to different industries.

Read More

What is "dwell time" in CyberSecurity?

Dwell time is a term used in the field of cybersecurity to refer to the amount of time that a cyber attacker is able to remain undetected within a system or network after gaining initial access. In this blog post, we will discuss what dwell time is, its significance in cybersecurity, and the steps organizations can take to reduce dwell time and improve their overall security.

Read More
cybersecurity, incident, incident response, defense Christian Grupp cybersecurity, incident, incident response, defense Christian Grupp

How to identify if you have a security incident?

A security incident is an event that has the potential to compromise the confidentiality, integrity or availability of an organization's information systems or data. Identifying a security incident is crucial to minimize its impact and to prevent it from happening again. In this blog post, we will discuss the different ways to identify if an organization has a security incident, and the steps that should be taken to respond to it.

Read More
cybersecurity, breach, hack, incident, incident response Christian Grupp cybersecurity, breach, hack, incident, incident response Christian Grupp

I was hacked - now what?

A cyber attack can be a devastating event for any business, leading to loss of sensitive information, financial losses, and damage to the company's reputation. In this blog post, we will discuss the importance of having a plan in place to respond to a cyber attack and the key steps you should take, including hiring a firm to help you every step of the way and having a firm on retainer in case you get hacked.

Read More