Uncategorized

Data Security versus System Security- Do you know the difference?

Posted on Jan 13, 2022

Data Security versus System Security- Do you know the difference?

If you don’t have appropriate security systems in place, just a single employee can unwittingly undermine your best efforts in cybersecurity.

A comprehensive security system is vital to derail a potential attack vector, the path of a cyberattack. Good security control starts with understanding data security versus system security and how both help address security threats.


What Is Data Security?

Cybersecurity involves data protection, such as data privacy, integrity, and access control, according to the International Organization for Standardization (ISO).

Examples of Data Security

The international standard for information security, ISO 27001, lists fourteen domains to consider in the protection of sensitive information, such as financial data, intellectual property, or employee details. Some examples of data security include the following:

  • Two-factor authentication
  • Strong passwords
  • Data encryption
  • Biometric verification, such as fingerprint authentication

Core Elements of Data Security

You can think about data protection using the CIA triad. The letter C stands for confidentiality, meaning only authorized people can access sensitive data. The I stands for integrity, data consistency and accuracy. The A, for availability, refers to how easily authorized parties can access confidential data.

What Is System Security?

A system security plan includes network security with an eye toward cloud computing.

Common Types of System Security

A common device of system security is a firewall, which monitors network access and should thwart a potential network attack.

On a more complex level, public key encryption encodes two distinct digital keys that work together to prevent unauthorized access to information. Network users must have both keys to access information. 

Read More »

Tech Buying in COVID: Hurry up and Wait

Posted on Nov 11, 2021

Tech Buying in COVID: Hurry up and Wait

I admit it- I am spoiled by Amazon. While I purchase locally when I can (Instacart, Grubhub, Doordash, Shipt, and such when I cannot go out in person) I also appreciate being able to procure a hard-to-find item and have it delivered in sometimes only a few hours. 

Other industries that compete with Amazon have worked hard in recent years to catch up with the fleet-footed fleet of smiling vans. All companies on the fulfillment- side of the tech supply chain are suffering since the advent of COVID-19, and so are the hope and dreams of all would-be technology buyers. Since the shutdowns of 2020, our clients have seen radical changes to how quickly machines arrive at their offices: what may have taken at most a week to fulfill now can take multiple months to deliver. Ouch.  

Large scale organizations with immense buying power are even having trouble obtaining the technology items they need- the bottleneck at manufacturers has yet to move. What is the strategy for small and midsized businesses to procure laptops, docking stations, monitors, and, well, anything with a chip so they can keep working? We have a few thoughts. 

Read More »

CMMC Candidate C3PAO

Posted on Aug 30, 2021

CMMC Candidate C3PAO

MNS Group has been selected as a Candidate Cybersecurity Maturity Model Certification (CMMC) Third-Party Assessor Organization (C3PAO) by the CMMC Accreditation Body. Only C3PAOs are authorized to conduct CMMC assessments. MNS Group has the C3PAO Candidate designation until the DoD performs a Level 3 audit of our company. We will be able to conduct a CMMC Assessment as an Authorized C3PAO for the Organization Seeking Certification (OSC) after receiving our audit. 

Read More »

Mandate MFA for your organization

Posted on Apr 27, 2021

Mandate MFA for your organization

The US Government is urging organizations to mandate MFA (Multi-factor Authentication) to protect against threat activity by Russia’s Foreign Intelligence Service (SVR). The FBI, the Department of Homeland Security (DHS), and the Cybersecurity & Infrastructure Security Agency (CISA) have put out a special joint advisory warning government agencies, information technology companies and other policy analysis groups to prepare for against attacks from APT29, a threat group that they describe as working for the SVR. This notice comes on the heels of the Biden administration’s formal attribution of the SolarWinds attack and targeted attacks on COVID-19 research facilities to SVR.

MNS Group advises organizations to implement MFA as an integral part of a unified cybersecurity program. The increase in complexity and sophistication of cyber-attacks on businesses and organizations of all sizes warrants the analysis and expansion of cybersecurity policy to mandate MFA as a bare minimum. If you are curious about ways to implement MFA into your programing, join us on May 27 or June 22 in our Security Basics Webinar series, MFA: The Biggest Bang for your Security Buck. Sign up today.

Read More »

CMMC Take Aways for the NON-DIB Business

Posted on Mar 24, 2021

CMMC Take Aways for the NON-DIB Business

There is a great deal for businesses in the commercial space to glean from the CMMC standards to apply to their organization’s cybersecurity. Securing your data, defending the integrity and infrastructure of your business from cyberattacks and disruption is undeniably one of the most important roles for business leaders. Even if your business is not part of the DIB supply chain as a government contractor, or as a cybersecurity professional, businesspersons have a responsibly to fellow employees, clients, and their country to remain cyber-safe, cyber-secure and cyber-resilient.

Read More »

Great! You Are Vaccinated! Now: PROVE IT

Posted on Feb 23, 2021

Great! You Are Vaccinated! Now: PROVE IT

As vaccines roll out across the world, we are all getting a little more optimistic that we will be able to travel (remember that?) and see friends and family again. But don’t get your wheelie suitcase out just yet. How will you PROVE, in an acceptable way, that you are vaccinated?

Read More »