Cyber Security Technology
According to an Aug 2022 article in Forbes, cyber security is the top concern for 44% of business risk management experts. (source) This worry is well founded as data breaches and cyber attacks grew 15% in 2021. In response, spending on information security and risk management will increase by 12% in 2022. What this means is that many companies believe that cyber risk is increasing and they can spend down the risk.
​
Exhibit A believes in carefully weighing the company's risk before purchasing and implementing new cyber infrastructure. Often, companies already have excellent equipment, but they don't know where it leaves their overall risk. Before purchasing additional technology, please contact Exhibit A for a risk assessment. Often, you already have what you need, it just needs a helping hand to get there.
​
Asset Management
RunZero
​
Digital Forensics
Autopsy
Belkasoft X
Magnet Axiom Cyber
Metaspike Forensic Email Collector
Metaspike Forensic Email Intelligence
Sumuri Paladin LTS
Sumuri Recon ITR
X-Ways Forensics
​
Endpoint Detection Response (EDR)
Crowdstrike
Microsoft Defender P2 (Not Defender bundled with Windows)
Sentinel One
​
Incident Response Triage
Metaspike Triage
​
SIEM (Security Information and Event Management)
​
Articles on Secure Configuration
Secure configuration is really two parts... First, you configure a device securely. Then, you regularly test it. Many updates, both by manufacturers and technical staff, will make a configuration that at one time was secure and best practice, vulnerable and in need of remediation. In turn, your secure configuration methodology must cover both parts of this critical area. Our CIS18 Risk Assessment Method that we use to measure the overall risk of a company covers this part of cyber security.
​
Azure Active Directory (AAD)
You'll want Azure Active Directory Premium P2 to get access to powerful conditional access policies. These are essential to limit exposure in case of a cyber incident.
​
Operating System Hardening
​
Work from Home
The dangers of bring your own device (BYOD)
​