Bryon MillerWhen software is installed on information systems, it is important that it is controlled to help…New vulnerabilities in the operational software should be screend and identified for operating systems, software applications, and firmware…Jul 28, 2022Jul 28, 2022
Bryon MillerAudit Logs: Best Practices for SecurityAudit logs are the key to monitoring for unauthorized activities, insider threats, and issues that may be affecting system performance.Mar 9, 2022Mar 9, 2022
Bryon MillerBackup Strategy, Configuration, and DocumentationIf organizations do not effectively maintain regular backups of systems, configurations, and information, they are not likely to have the…Feb 23, 2022Feb 23, 2022
Bryon MillerWhat are Cabling Security Controls?The lack of basic power and telecommunications cabling security controls, along with protective measures, could cause unexpected outages…Feb 9, 2022Feb 9, 2022
Bryon MillerManaging Supporting UtilitiesEquipment should be protected from power failures and other disruptions that may be caused by failures in supporting utilities.Jan 26, 2022Jan 26, 2022
Bryon MillerWhat’s the Next Significant Security & Compliance Challenge in 2022?In the first work week of the year, I’ve seen several different articles and blog posts about predictions and what to expect from an IT…Jan 12, 2022Jan 12, 2022
Bryon MillerIt’s Not Rocket Science — Secure Unattended Information SystemsIt doesn’t take a rocket scientist to recognize that an access control policy need to be implemented to secure information systems when…Jan 7, 2022Jan 7, 2022
Bryon MillerClassification, Labeling, and Handling of Information AssetsInformation assets, including printed materials, email attachments, or other data, should be classified appropriately to ensure they are…Dec 6, 2021Dec 6, 2021
Bryon MillerBalancing Admin Rights & Control — Privilege Access ManagementOrganizations need to have controls in place for the management of accounts with privileged access. Privileged access management is needed…Dec 6, 2021Dec 6, 2021
Bryon MillerWhy a “One-and-Done” Access Control Policy Won’t Cut ItUnauthorized or inappropriate account access is likely to occur within organizations if ongoing maintenance is not in place for all…Dec 6, 2021Dec 6, 2021