NEWS & UPDATES        

Posts about:

Advice

Penetration Test Versus Vulnerability Scan

What’s the Difference Between a Vulnerability Scan and a PEN Test?

We find that often customers become confused between a Vulnerability Scan and a Penetration (PEN) test.  We’ve created this table below to show the differences. 
 
Basically, a  vulnerability scan is an automated, high-level test that looks for and reports potential vulnerabilities.
 
A penetration test is a detailed hands-on examination by an actual person that tries to detect and exploit weaknesses in your system.
 
These tests are good steps to maintain Cybersecurity compliance
Read More
Insider Threat awareness

Insider Threat Awareness

An insider threat in cybersecurity refers to the risk of an organization's data or network being compromised by a trusted individual within the organization, such as an employee, contractor, or business partner. Insider threats can be intentional or unintentional, and they can be caused by a variety of factors, including malice, carelessness, or ignorance.

Read More
Cybernines discusses new Cyber rules for FEMA NFIPs

Cyber changes come to FEMA's NFIP

On the 27th of February FEMA announced the Fiscal Year 2024 Financial Assistance/Subsidy Arrangement for private property insurers interested in participating in the National Flood Insurance Program’s (NFIP) Write Your Own (WYO) Program. This announcement contains specific requirements regarding cybersecurity, which need to be attained by private insurance companies participating in NFIP’s WYO. 

Read More
mobile device security best practices

Mobile Device Security Best Practices

Mobile devices have become an integral part of our lives, and we use them for various activities like communication, browsing the internet, online transactions, and more. However, they are also vulnerable to security threats like data breaches, malware attacks, and theft. To ensure the security of your mobile devices, you should follow these best practices:

Read More

How to Submit a NIST Score?

The Department of Defense’s (DoD) Interim Final Rule that went into effect on 30 November 2020, requires both primes and sub-contractors to submit their NIST SP 800-171 assessment score to the Supplier Performance Risk System (SPRS). While the rule will only impact new contracts, the DoD plans to do 148 Medium Assessments and 81 High Assessments over the next three years, with an estimated 8,823 basic assessment scores to be uploaded on SPRS each year to award new contracts to small businesses. At CyberNINES, we are aware of these changes and committed to helping small and medium-sized businesses accept purchase orders from the DoD and Prime Contractors.   

Read More

Small Businesses Are Especially Vulnerable to Ransomware Trends

Small businesses often rely on Managed Service Providers (MSPs) to handle their IT needs including cybersecurity. However, ransomware targets companies of all sizes, and small businesses are especially vulnerable to supply chain attacks. In this July Newsletter of Cyber Security Summit | Minneapolis, MN Scott Singer, President of CyberNINES, shares a few basic strategies for small businesses to protect themselves from ransomware supply chain attacks.

Read More

Sign up for the latest News & Updates from CyberNINES!