Blog iconBlog

Carolina Advanced Digital, Inc. > Blog

COVID-19 Cybersecurity Checklist: 4 Steps to Secure Remote Workers

If your organization plans to provide remote work options, it’s important to ensure employees are equipped with the proper tools, resources and security protections needed to protect against increased threats. The CISA recently issued checklists and guidance documents to help executives evaluate potential workforce and operations disruptions along with actions for security protection. Below are four important steps to creating a safe remote work environment.


Read More
email email email email email email email
profile iconPosted by Jennifer Minella

Tech Q&A: Will my current infrastructure support client VPNs?

VPN usage in the U.S. grew by 53% in 1 week. With the onset of the COVID-19 pandemic, many organizations are asking some variation of the question “will my infrastructure support remote access for my employees?” We asked the engineering team how they’re answering these
client questions, and here’s what they shared.


Read More
email email email email email email email
profile iconPosted by Jennifer Minella

Preparing the Talent Pipeline in Cybersecurity: Carolina Advanced Digital & the Black Falcons

Through these interactions and experiences, students can explore firsthand the topics and careers they are interested in. The Black Falcons have produced dozens of cybersecurity professionals over the years, two of which went on to work for the National Security Agency (NSA). If we want to bridge the talent gap, we must continue to support programs that are designed to encourage younger generations to pursue careers in cybersecurity and STEM-related fields. Help us get students excited about cyber!


Read More
email email email email email email email
profile iconPosted by Jennifer Minella

3 Ways to Measure the Effectiveness of Your Cybersecurity Program

69% of CEOs believe a strong cyber strategy is critical to building trust with key stakeholders, but many respondents still lack the preparation needed to handle a cyber event. One way to know if security controls are defending your organization is to conduct frequent tests. Several measures can be implemented to help an organization gauge the effectiveness of its existing security
controls.


Read More
email email email email email email email
profile iconPosted by Jennifer Minella

Iran Cyber-Response: 4 Recommendations for Defending Your Organization from Nation-State Attacks

While we offer services to review and assess firewall rules for security, if you have the resources in-house, organizations can tackle this by configuring rules to log (audit mode) temporarily and reviewing the to see which are being used. If it hasn’t already been done (and documented) further research should be done to review the in-use rules, identify the resources in play, and make sure there’s a business case documented for each policy or rule set.


Read More
email email email email email email email
profile iconPosted by Jennifer Minella
getcomixxx.com