FWIW, I'm doing month-end maintenance for my clients tonight, and there's been unusually high activity from China blocked and logged by their firewalls. These include non-government, low profile businesses. If anything is getting through, well, the logs don't show it because they don't know...
#cybersecurity
You know all those vendors in booths at the fairgrounds? Do you know why they're selling person-to-person in booths at the fairgrounds?
Because their products aren't commercially viable.
That doesn't mean the product is bad. It's hand-made, or very niche, or something else. For whatever reason, it's not commercially viable.
@peterquirk Agreed. Keep in mind what that the "Essential Eight" isn't the entire scope of the ASD's cybersecurity guidance. Here's a page from the Table of Contents of their
Information Security Manual. They do address that very important aspect of a comprehensive cybersecurity program.
I just downloaded and reviewed the Essential 8 from the Australian Signals Directorate. I'm in the USA, so I can't use it in any regulated organization, but this is a high quality #cybersecurity plan. Well done, Australia.
https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight
@northernbassist Thank you for the link to the Smithsonian article. I knew they had received an intelligible reply a while ago, but didn't know that the engineers had successfully gotten all the instruments reporting.
Over the weekend I was called on to be part of the incident response team in the middle of a real-time ransomware attack. Their current backup was online, and of course it was encrypted, too. The company’s most recent backup that wasn’t encrypted was about three weeks old, and it was pure chance that the three-week old copy even existed.
[LinkedIn article]
Computer and network services. Small business and SOHO remote tech support. Data and account recovery when a loved one dies. Licensed and insured.