JustProtect Cybersecurity Blog

    How JustProtect assesses 100% of our third parties

    Dec 14, 2021 1:40:26 PM / by Bryan "SOC" Urias posted in compliance, vendor, Risk Assessor, Security, Log4j

    Being the Information Security Manager at a startup, I have to be able to demonstrate to our CEO that we have acted on critical vulnerabilities. It also means that I have to be quick and efficient. Here's how I assess all of our third parties under 60 seconds using our platform:

    Read More

    Why the SolarWinds Lawsuit should concern CFOs as well as CISOs

    Aug 20, 2021 10:00:00 AM / by Haley Keitel posted in cybersecurity, Security, CISO, CFO, data breach

    SolarWinds is facing a continued lawsuit from investors that has specifically named the CFO and now the CISO, as a result of their lack of disclosure controls and systems surrounding their cybersecurity risk management following a major breach.  

    Read More

    10 tips for cybersecurity professionals

    Aug 19, 2021 2:00:00 PM / by Haley Keitel posted in cybersecurity, Strategy, Security, CISO

    We want to equip you with tips on how to markedly improve efficacy in your role. While these tips are general enough to apply to anyone in security, we find that they are geared towards anyone fresh to the industry or new in a cybersecurity role 

    Read on for our top ten tips for cybersecurity professionals like yourself. 

    Read More

    3 ways to simplify cybersecurity and risk management without the anxiety

    Jul 21, 2021 5:00:00 PM / by Haley Keitel posted in compliance, cybersecurity, 3rd party, Risk Assessor, Security, privacy

    Here are three quick ways to simplify your risk management processes without increasing your anxiety or your costs.

    Read More

    Why a company like yours doesn't need a fully formalized ISMS.

    Jul 7, 2021 1:21:01 PM / by Bryan "SOC" Urias posted in cybersecurity, Strategy, dashboards, Security

    An Information Security Management System (ISMS) is simply a framework for information security practices within your organization. You may immediately jump to think about a full set of policies and procedures, several stacks of network appliances, certifications, and an endless number of hoops to jump through.

    The good news is that you don’t have to start there, the most important step is not the first step or the last step. It’s the next step. You can simply begin using risk-based strategies to build your ISMS one layer at a time.

    Read More

    First American Financial Corporation Enforcement

    Jun 30, 2021 3:19:25 PM / by Haley Keitel posted in compliance, cybersecurity, Policy, Security

    First American Financial Corporation (FAFC) is facing the first-ever penalty from the SEC in the form of a cease-and-desist order and civil fines, as a result of their lack of disclosure controls and systems surrounding their cybersecurity risk management. 

    Read More

    How assessments can prevent ransomware

    Jun 21, 2021 4:48:04 PM / by Haley Keitel posted in cybersecurity, assessments, Security, ransomware

    Ransomware is not isolated to tech companies, which is clearer than ever given the attacks this year. In a recent interview with Now This, our CEO Vikas Bhatia, discussed the fundamentals of these attacks and how companies across industries can better prepare by utilizing a third-party risk management plan. 

    Read More

    Comments