IT Security from Government Technology: “3 Ways to Fight the Cybertalent War”

3 Ways to Fight the Cybertalent War

Getting and keeping top cybersecurity staff in government isn’t always easy, but there are strategies available to build your workforce.

History teaches us that great leaders build great teams. Surveys confirm and reconfirm that attracting and retaining talent is key to achieving organizational objectives and building a culture that makes a positive difference.

But attracting or retaining professionals with any credible cybersecurity experience into government positions has never been harder than it is right now. Constraints such as compensation packages make it hard to compete in our new “talent war.”

Further complicating this problem are government employees eligible for retirement. A public-sector “brain drain” is still predicted when staff with more than 30 years’ experience decide to retire.

Source: www.govtech.com/security/GT-OctoberNovember-2017-3-Ways-to-Fight-the-Cybertalent-War.html

Continue Reading

IT Security from Government Technology: “U.S. House Cybersecurity Bill Targets Small-Business Knowledge Gap”

U.S. House Cybersecurity Bill Targets Small-Business Knowledge Gap

(TNS) — PANAMA CITY, Fla. — Cybersecurity can be a big problem for small businesses.

Just ask Fazio Mechanical Services, the mid-sized HVAC company that was hacked leading to the 2013 Target hack that compromised millions of credit cards.

“The hackers went into that small business with a phishing scam, someone clicking on something they shouldn’t have clicked on, and as they began to move through the system they found this doorway to Target and produced a hack that affected more than 20 million people,” said Guy Garrett, an associate professor of cybersecurity at Gulf Coast State College.

Source: www.govtech.com/security/US-House-Cybersecurity-Bill-Targets-Small-Business-Knowledge-Gap.html

Continue Reading

CISSP Practice question #42

Who is the governance part of our organization?
A: Middle management.
B: The users.
C: Senior management.
D: The IT leadership team.

CBK 1: Security and Risk Management
Source: ThorTeaches.com practice tests

Answer


C: The senior leadership in our organization sets the company direction and clarifies when there are questions. They are the governing body, although they can at times be doing so under the directions of the board.

show less

Continue Reading

IT Security from ScTimes: “Cybersecurity threats create career opportunities”

Cybersecurity threats create career opportunities

Early on July 4, hackers redirected traffic from Stearns County’s website to a site that claimed to be “testing some tricks.” A similar hack happened two days later in Leon County, Florida.

In the aftermath of both breaches, employees from both county’s information services departments worked tirelessly to analyze the threat and prevent future ones.

Source: www.sctimes.com/story/news/local/spark/2017/11/03/cybersecurity-threats-create-career-opportunities/761049001/

Continue Reading

CISSP Practice question #41

We are implementing remote journaling, how does it help us ensure we can recover from a data loss on our primary systems?
A: It sends transaction logs to a remote location, but not the files themselves. We can rebuild the transactions from the logs.
B: It uses a remote backups service that sends backups files electronically offsite at a certain interval or when the files change.
C: It makes an exact real time copy at another location, this can be another local disk or preferred remote to another type of media.
D: It takes a full backup of our database once a week to tape.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


A: Remote journaling: Sends transaction log files to a remote location, not the files themselves. The transactions can be rebuilt from the logs if we lose the original files.

show less

Continue Reading