Category: Best Practices

  • Regulatory Compliance Frameworks

    Regulatory Compliance Frameworks

    A short list of the primary standards and laws that most companies need to follow concerning the collection and storage of digital data.

  • Tips to Safeguard Your Digital Secrets

    Tips to Safeguard Your Digital Secrets

    Introduction Password manager databases, asynchronous keys, digital signatures, and MFA recovery passcodes are designed to identify you, decrypt files, or help you recover from a failed 2FA login. Care must be taken to protect these digital items so they do not fall into unwanted hands. The below techniques are not a cure all, and other…

  • Managing Your Passwords

    Managing Your Passwords

    Forward Good password habits are essential for any person who works regularly online. Due to regulations or contracts with customers, many business are required to have specific password polices. In 2024, here are some of the most recent recommendations concerning passwords. Password Best Practices As part of a good password management practice, whether at home…

  • Standards & Organizational Controls (SOC)

    Standards & Organizational Controls (SOC)

    Brief Overview Standards and Organization Controls (SOC) is an information security framework designed to help companies stress test their information security controls and catch any deficiencies in a company’s security posture PRIOR to a government inspection or external third party audit. A SOC audit is an internal company audit primarily designed to provide the company…

  • Indicators of Compromise

    Indicators of Compromise

    Introduction Users, computers, and even entire networks can be all be compromised. Depending on the scenario, security analyst’s have to look out for different type of indicator’s of compromise (IOC). I discuss multiple scenarios below and give examples of what to be on the lookout for. If a compromise is suspected, you should collect basic…

  • Job Duties of a Security Analyst

    Job Duties of a Security Analyst

    Introduction An enterprise security operations center (SOC) analyst’s responsibilities are both wide and varied. Based on my personal experience, this is a list of duties working in the industry. If you have limited time or resources, you should consider focusing on reviewing log events. Monitor Security Systems Security systems should be continuously monitored to look…