Managing Cyber Risk through Best Practices

Home

About

Providing organizational cybersecurity assessments by measuring an organization's five concurrent and continuous functions defined by the NIST Cybersecurity Framework, known as the Framework Core:


IDENTIFY
Know your environment. Unused or underused assets are a liability--remove them to reduce your security costs. Identify anyone or anything that might have access to your systems.
.
.
.
.
.
PROTECT
Employ best practices for protecting your hardware, software, and information assets.
.
.
.
.
.
DETECT
Reduce the damage: Know as soon as possible when, not if, your network or systems have been breached The average breach is not discovered for weeks or months.
.
.




.

RESPOND
Create a breach response plan and test your plan regularly. Modify it when necessary.
.
.
.
.
RECOVER
The majority of small businesses never recover from a serious breach. A recovery plan must be part of your response plan.



 
Contact Karen Thurston, kthurston@basetwosolutions.com
Cybersecurity Professionals is a service of Base Two Solutions, LLC

Managing Cyber Risk through Best Practices