PinnedShawn Faham, MSc, MBA, CISSP, CISM, Sec+FOUR STEPS TO AN EFFECTIVE SECURITY INCIDENT RESPONSE ACCORDING TO NIST 800–61The NIST incident response 800–61 is a guideline published by the National Institute of Standards and Technology (NIST) that provides…Jan 4, 2023Jan 4, 2023
PinnedShawn Faham, MSc, MBA, CISSP, CISM, Sec+FIVE THINFS YOU SHOULD DO TO PASS THE CISSP EXAM IN 2023Are you considering taking the Certified Information Systems Security Professional (CISSP) exam in 2023? The following, are five things you…Jan 2, 2023Jan 2, 2023
Shawn Faham, MSc, MBA, CISSP, CISM, Sec+Six Ways to Identify a Security IncidentThere are many ways to identify a security incident, depending on the specific situation and the resources available. Some common methods…Jan 9, 2023Jan 9, 2023
Shawn Faham, MSc, MBA, CISSP, CISM, Sec+Seven Things Organizations Should Do to Defend Against RansomwareRansomware is a type of malware that encrypts a victim’s files, making them inaccessible until a ransom is paid to the attacker to decrypt…Jan 8, 2023Jan 8, 2023
Shawn Faham, MSc, MBA, CISSP, CISM, Sec+Six Attack Vectors to Watch for When Responding to a Security Incident According to NIST 800–61NIST 800–61 identifies several incident categories, based on main common methods of attack which are:Jan 4, 2023Jan 4, 2023
Shawn Faham, MSc, MBA, CISSP, CISM, Sec+FIVE SKILLS YOU NEED TO LEARN TO BECOME A SECURITY INCIDENT RESPONDERThere are many skills that can be helpful for a person who is interested in becoming an incident security responder, but here are five key…Jan 3, 2023Jan 3, 2023
Shawn Faham, MSc, MBA, CISSP, CISM, Sec+FIVE THINGS YOU SHOULD DO TO PASS THE CISM EXAM IN 2023Are you considering taking the Certified Information Security manager (CISM) exam in 2023? The following, are five things you should do to…Jan 2, 2023Jan 2, 2023