Can you afford to lose key systems or productivity? Which systems are vital and need to fail-over when inevitable disaster or comprise strikes? Knowing the risks and managing the impact is a skill acquires through experience and study. Having managed a data center which hosted 1000's of business critical servers, I have seen what a power failure or network based attack can cripple or even destroy a business. Let me help you with asking the right questions to find the best budget and plan to prepare for the worst-case and reduce the risk to a tolerable level. There is never an absence of risk, but understanding and reducing the impact will help a business survive a critical event.
Have you heard of a tiger team? If you haven't heard of one, then it is because they have done a great job of not being noticed!
The term "tiger team" comes from the military reference that describes a friendly penetration task force.
It has been described as 'a team of undomesticated and uninhibited technical specialists, selected for their experience, energy, and imagination, and assigned to track down relentlessly every possible source of failure in a spacecraft subsystem. This may not sound like a friendly bunch of people or perhaps they remind you of the A-Team from the early 80's TV show. The experts assembled for our purposes are IT professionals that will aggressively test the social, technical, and physical vectors in your company. No driving through the front wall or repeling down from the air vents, but we will promise to list and provide recommendations for addressing vulnerabilities in your business along with risk management services.
The NSA Cyber Defense Tiger Team (Red Cell) is a tiger team that was created by the National Security Agency Tiger Team, BAE Systems, Portsmouth Naval Shipyard. International Fast Response Ship Repair team
We are able to provide the latest in network, system, software, and social engineering method to test the security and integrity of your organization. Find out where your weaknesses ae before they are shown to you by malicious hackers, intruders, and disgruntled associates.
A recent speech on June 26th, 2013 by FTC Commisisoner Julie Brill, raised the large issue of scrubing your data from the big data being collected around the world. Her topical Keynote was titled: Reclaim Your Name" and dealth with many of the main challenges associated today with personal dat collection.
The full 12 page PDF can be read here at the FTC governement website: http://www.ftc.gov/speeches/brill/130626computersfreedom.pdf
HoneyPots are assumed by many people to be the embodiment of "entrapment", but the common use of a honeypot has a simple results: exposing the malicious network traffic around you.
A honeypot is set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. Because normal daily traffic should not enter this system as it has no true use, it exposes noise and attacks that would come toward it and what aspects of the system are most often exploited.
Researches from MIT have recently utilized common wireless internet in your house or coffee shop type technology to see the movement of people through the walls.
The video below depicts a demonstration of a person walking around a room and the sensor detecting their relative direction of movement at any given time to the signal device.
In my imagination, a 3-4 sensor system and coordination betweenthem, to triangulate position isn't far off. You could build a simple motion sensing x-ray machine like in the movie 'Total Recall'.
understand security consulting...before you choose
Not just the uniformed security gaurd, or the spying NSA agents should be on your mind. Picture the IT team at a mid-size company responsible for knowing how all the things work: the email, the website, the servers, the network, the phones, and the physical perimeter of the organization. Now imagine these specialists are organized, professional, well-managed, intelligent, expereinced, and educated in the ways of todays security concerns. Were you picturing your IT management team, or did they miss the mark in some area. Don't feel bad if your team managed service provider doesn't have all these skills or if they only pretend to be experts at everything. No one person is an expert in everything IT, but ensuring your have a proffesional with the subject matter experts available to fill the gaps to stregthen your IT team means you have a quality security consultant.
Knowing that a security problem exists, but not knowing all the possible problems and how they can affect you becomes an opportunity for you to seek help. Basic security concerns can be listed and ordered by priority so you may consider all the vulnerable areas of your organization. Knowing what to look for from a "risk" point of view, requires experts in disaster recovery planning and understanding how to manage risk. Security consulting offers advisement to jump start your security and risk assessment plan to protect your organization.
If you are asking for a security consultant, then you are ready to know. Even small companies and LLC's need to protect themseves. Before a hacked website, email account, customer database, or financial comprimise comprimises your organization, is the best time. After an expereince like that, you'll just understand how important it is to do sooner.
Many security consultants are ex-military, or governement experts. Some come from the private sector and have expereince in companies like yours in an environment precisely like your business operates. If you prefer the experts advice you get comes from a place that your company needs to be, then why not hire part-time if you don't have the budget for a Chief Information Security Offcer andd a team of eperts to support them.
Imagine a salesperson is selling you a car to drive your family around and they speak to the concerns you may have about the safety. You may only care about seat belts, but perhaps airbags, re-enforced bumpers, crumple zones, anti-lock brakes, and LED headlights is really what is needed to make your family safer? The information to provide risk management services means expert understanding of the true and really threats that can affect your organizations safety and provide quantification of your risk and provide fair solutions to assess, evaluate, manage and measure the risk at an acceptable and affordable level.