top of page

Cyber Security Technology

 

According to an Aug 2022 article in Forbes, cyber security is the top concern for 44% of business risk management experts. (source) This worry is well founded as data breaches and cyber attacks grew 15% in 2021. In response, spending on information security and risk management will increase by 12% in 2022. What this means is that many companies believe that cyber risk is increasing and they can spend down the risk.

​

Exhibit A believes in carefully weighing the company's risk before purchasing and implementing new cyber infrastructure. Often, companies already have excellent equipment, but they don't know where it leaves their overall risk. Before purchasing additional technology, please contact Exhibit A for a risk assessment. Often, you already have what you need, it just needs a helping hand to get there.

​

Asset Management

RunZero

​

Digital Forensics

Autopsy

Belkasoft X

Magnet Axiom Cyber

Metaspike Forensic Email Collector

Metaspike Forensic Email Intelligence

Sumuri Paladin LTS

Sumuri Recon ITR

X-Ways Forensics

​

Endpoint Detection Response (EDR)

Crowdstrike

Microsoft Defender P2 (Not Defender bundled with Windows)

Sentinel One

​

Incident Response Triage

KAPE Tools

Metaspike Triage

Velociraptor

​

SIEM (Security Information and Event Management)

Microsoft Sentinel

Wazuh

​
 

Articles on Secure Configuration

Secure configuration is really two parts... First, you configure a device securely. Then, you regularly test it. Many updates, both by manufacturers and technical staff, will make a configuration that at one time was secure and best practice, vulnerable and in need of remediation. In turn, your secure configuration methodology must cover both parts of this critical area. Our CIS18 Risk Assessment Method that we use to measure the overall risk of a company covers this part of cyber security.

​

Azure Active Directory (AAD)

You'll want Azure Active Directory Premium P2 to get access to powerful conditional access policies. These are essential to limit exposure in case of a cyber incident.

Azure AD Best Practices

Microsoft Azure AD Pricing

​

Operating System Hardening

CIS 18 Benchmark List

CIS-CAT Pro

​

Work from Home

The dangers of bring your own device (BYOD)

Segmenting home networks

​

bottom of page