NIST Cybersecurity Framework – A Risk Assessment Process

5/23/2019 by Chris Becher

In partnership with itSM Solutions LLC and UMass Lowell, a NSA/DHS National Center of Academic Excellence in Cyber Defense Research (CAE-R), LRS Education Services is proud to offer the NIST Cybersecurity Professional (NCSP) training curriculum. The curriculum is designed to train how to engineer and implement a cybersecurity program to protect critical assets using the NCSF.
Read More »about NIST Cybersecurity Framework – A Risk Assessment Process

Fun with Kali

4/1/2019 by Troy Stoneking

Admittedly the vast majority of my technical background is on the Windows side. Like many of you I’ve spent years in the field and through training courses improving my Windows skills and gathering a bunch of certifications from Microsoft. Windows is powerful and ubiquitous. I have a great time working in Windows networks and teaching Microsoft courses. But sometimes we all need to broaden our horizons.
Read More »about Fun with Kali

Are You Ready To Assess The State of Your Cybersecurity?

3/25/2019 by Troy Stoneking

We are very proud of our NIST CSF courses. The reviews have been fantastic! Many organizations take that knowledge and create or improve a cybersecurity program on their own. In the Bootcamp/Practitioner classes we get very specific as to what that program could contain and how it might be organized. However, we’ve heard from clients that they want more. They need a partner to come alongside and help them through the process of discovering exactly where they are in cybersecurity. What’s going well, what are the gaps and what should be done to close them?
Read More »about Are You Ready To Assess The State of Your Cybersecurity?

The End of Antivirus?

1/3/2019 by Troy Stoneking

A few weeks ago I was speaking to a client about the need for antivirus as called for in the Payment Card Industry Data Security standards (PCIDSS) Requirement 5: Protect all systems against malware and regularly update antivirus software or programs. He made an unusual statement, “We don’t use antivirus.” Having been in IT and cybersecurity for many years I knew this was eventually coming, but it was the first time I’d seen it in a real-world implementation. Here are some facts:
Read More »about The End of Antivirus?

Security+ is Important TODAY!

11/20/2018 by Karen Gill

It doesn’t matter if you are at a small business or a very large company, cybersecurity is more important today than it has ever been! As we move into the holiday season, retail cybersecurity is dominating our attention, but any company involved in digital transformation continues to lack the workforce needed to protect assets.
Read More »about Security+ is Important TODAY!

Can't You Trust Anyone Anymore?

9/4/2018 by Troy Stoneking

When I’m working with a client and the topic of cybersecurity arises they want to talk about attacks from Russia, North Korea or various organized crime entities. But did you know that these types of threats are not the most likely avenue from which you’ll have a breach in your cybersecurity? In fact they are WAY down the list of who’ll be the reason your security is compromised. Want to know the greatest threat?
Read More »about Can't You Trust Anyone Anymore?

What is JEA and How Can It Make Your Systems More Secure?

4/13/2018 by Troy Stoneking

Thanks for watching this video blog entitled: What is JEA and How Can It Make Your Systems More Secure? Microsoft has extensive documentation about JEA at: https://docs.microsoft.com/en-us/powershell/jea/overview In addition, as mentioned in the video, we have a class that covers JEA and many other great Windows Server 2016 security related topics. For details on the…
Read More »about What is JEA and How Can It Make Your Systems More Secure?

When the CEO Asks: Are We Secure?

1/15/2018 by LRS Education Services

Recently while working with another organization in the middle of the WannaCry attack we made significant changes to their systems. We ran emergency patches to some devices, adjusted the public Wi-Fi access, became even more diligent about defense in depth and pushed out details to confirm all staff were informed about how such attacks could enter even a well-protected organization.
Read More »about When the CEO Asks: Are We Secure?