Introduction In the IT realm, patch management is vital. It ensures software security and efficiency. As we approach the end of support for Windows Server 2012 on October 10, 2023, the importance of patch management grows. Without Microsoft's regular updates, systems on Windows Server 2012 will become vulnerable. Therefore, effective patch management is necessary. In this article, we'll discuss patch management and its increasing relevance as Windows Server 2012 approaches its end of life. 1. The Role of Patch Management Patch management, at its core, is systematic. It involves acquiring, testing, and installing patches on network applications. It's crucial for enhancing security, ensuring uptime, and maintaining compliance. Moreover, as Windows Server 2012 nears its end, relying on patch management strategies [...]
About Claire SpahrThis author has not yet filled in any details.
So far Claire Spahr has created 12 blog entries.
Vendor Management in Cybersecurity: Selecting the Right Partners The Real-World Impact of Vendor Management in Cybersecurity Did you know that in 2020, the SolarWinds cyber attack, which affected numerous government agencies and companies, was attributed to a compromised update from a trusted vendor? This real-life incident underscores the significance of vendor management in cybersecurity. In today's digital landscape, businesses face multifaceted cyber threats that can lead to massive financial loss, reputational damage, and daunting legal liabilities. One of the principal strategies for building a robust cybersecurity defense is selecting the right vendors equipped to fortify your IT infrastructure. Why is Vendor Management Critical in Cybersecurity? The 2013 Target breach, where attackers accessed the company's network through an HVAC contractor, [...]
Phoenix, AZ, September 19, 2023 — MSSP Alert, a CyberRisk Alliance resource, has once again honored AccountabilIT by including it in their prestigious list of Top 250 MSSPs, globally. This marks the seventh year in a row that AccountabilIT has earned this accolade. AccountabilIT has secured the #94 spot this year, surging forward by 17 positions from the previous year. This list has seen a growing presence of international competitors over recent years. Despite these challenges, AccountabilIT has not only maintained its spot but advanced significantly, particularly amongst U.S.-based MSSPs. AccountabilIT’s continuous innovations, particularly its focus on Microsoft-driven solutions, have contributed largely to this impressive growth. The company's offering, XDR + SIEM powered by Sentinel, continues to set a [...]
How CISOs can leverage the Microsoft Security Stack to Balance Security and Productivity in their OrganizationsClaire Spahr2023-08-17T20:38:29-07:00
Introduction: The CISO's Dilemma In today's fast-paced digital world, the role of the Chief Information Security Officer (CISO) is more crucial than ever. CISOs must manage a challenging balancing act: ensuring robust and reliable cybersecurity measures while keeping business productivity in full swing. How do effective CISOs balance security and productivity? We've gathered some thoughts and case studies to gain insight into this question. Join us as we explore this challenge to shed light on how to balance security and productivity. The Modern CISO Challenge In 2017, Bromium commissioned a study surveying 500 CISOs from companies with 1000+ employees across the USA, UK, and Germany. Their findings, published in a report titled “The CISO’s Dilemma: Security Versus Productivity,” revealed: [...]
The Evolution of Server Operating Systems For IT professionals and Managed Service Providers (MSPs), Windows Server is a computing cornerstone. With the advent of Windows Server 2022 in August 2021, the technology continues to evolve. However, a significant portion of organizations are still operating on Windows Server 2012, and it's crucial to note that its support period is nearing its end. From October 10, 2023, Microsoft will stop providing patches, software, and security updates for Windows Server 2012. This support termination escalates the potential for cyber threats, including malware attacks, ransomware, and performance degradation due to outdated systems or harmful activities such as data or cryptocurrency mining. But fear not; we're here to guide you through what you need [...]
In the ever-evolving realm of cybersecurity, change is both inevitable and essential. As organizations adopt new protocols and technologies, understanding the nature of resistance to change becomes paramount. Interestingly, this resistance isn't a new phenomenon. Looking back on insights from a 1969 Harvard Business Review article highlights the enduring nature of resistance to change. While our tools and strategies have evolved over time, the human response to change remains remarkably consistent. This article will explore just how timeless this issue is and will offer strategies for overcoming resistance to change in cybersecurity initiatives. Implementing New Protocols Introducing new cybersecurity measures often involves significant shifts in processes, technologies, and behaviors. Many organizations encounter resistance during these transitions. Naturally, humans tend [...]
Creating a Culture of Cybersecurity Awareness The Digital Challenge The digital landscape is vast and constantly changing. As we eagerly embrace new technologies, we inadvertently open doors to potential cyber threats. Whether for startups or global enterprises, the threat is universal. Consequently, data breaches, phishing scams, and ransomware have become pressing concerns. For this reason, adopting a proactive approach, deeply rooted in a robust cybersecurity culture, is not just beneficial—it's crucial. Defining Cybersecurity Culture So, what is this culture we speak of? Imagine it as a company's protective DNA. It encompasses the habits, attitudes, and actions that everyone in the organization takes to safeguard digital assets. From the boardroom to the break room, everyone plays a part. Moreover, this [...]
The Inevitable Progress of Technology Time is always moving forward, and so the Windows Server 2012 end of support deadline, October 10, 2023, is fast approaching. For many organizations, a significant change is on the horizon. Microsoft is ending its extended support for Windows Server 2012, a version that has been widely used and trusted for many years. The Implications of End of Support Once support ends, Microsoft will no longer provide security and product updates for this version. Organizations can choose to continue using the non-supported product. Still, they do so at their own risk, potentially falling out of compliance with industry standards such as GDPR and missing out on further product innovations. Security Risks and Challenges The [...]
Introducing AIT: The AccountabilIT Podcast, a Cybersecurity Show Now Available on Spotify, Apple Podcasts, and Google PodcastsClaire Spahr2023-07-26T09:49:36-07:00
Subscribe to the show on Spotify, Apple Podcasts, or Google Podcasts. Now available on Spotify, Apple Podcasts, and Google Podcasts, AIT: The AccountabilIT Podcast is a conversational show designed to address the most pressing cybersecurity concerns of today's cybersecurity stakeholders and decision-makers. Each episode explores a topical cybersecurity subject, offering insights, interviews, and practical advice to help navigate these challenges. This podcast aims to provide a diversity of voices in cybersecurity, with relevant information for professionals of all levels of technical expertise. Actionable Insights The purpose of the podcast is to discuss the ever-evolving challenges in cybersecurity and to offer practical solutions from cybersecurity professionals who do this every day. Available Now The first three episodes are [...]
As cybercrime escalates at an alarming pace, businesses worldwide are thrust into an urgent battle for cybersecurity. Governments and regulatory bodies, struggling to keep pace, are responding with targeted guidelines and regulations. While these measures span across various industries and activities, their main purpose remains the same: to protect consumers and reinforce your organization's data and network security. Yet, it's no easy feat. The real challenge lies not just in warding off cyber threats, but also in managing a multitude of cybersecurity frameworks. Each one has its own unique demands, presenting a complex puzzle. Are you ready to face this challenge? Keep reading, and we'll guide you through this intricate maze. This article explores the hurdles in achieving cybersecurity [...]
The threat of cybersecurity breaches grows in parallel with our increasing reliance on digital platforms. In today's cybersecurity landscape, a robust cybersecurity framework isn't a luxury but a necessity. Keep reading for an introductory overview of some of the most commonly adopted cybersecurity frameworks that organizations use to bolster their defenses. Numerous cybersecurity frameworks exist to help organizations manage risk and reduce vulnerability. Some sources mention up to 25! This post focuses on the four frameworks that are most relevant to our customers: NIST Cybersecurity Framework ISO 27001 CIS Controls CMMC Before we start, it's worth noting that a cybersecurity framework typically consists of guidelines, best practices, and standards that organizations can adopt to mitigate risks and lessen vulnerabilities. [...]
Introduction As technology continues to evolve, it is crucial for businesses to stay ahead of the curve and maintain a secure and efficient IT infrastructure. Accordingly, one critical aspect of this is recognizing the need to transition from Windows Server 2012. With its end of support on the horizon, businesses must take action to safeguard their operations and ensure long-term success. In this blog post, we'll explore the significance of this transition, potential risks, and provide guidance on navigating this change seamlessly. Understanding the Issue Windows Server 2012 and 2012 R2 have provided businesses with robust functionality and support for several years. However, relying on these platforms as the end of support date approaches can pose significant risks to [...]