• Skip to primary navigation
  • Skip to main content

American Cyber Security Management

Secure and certify all your data and processes

  • LinkedIn
  • Twitter
  • YouTube
  • Services
    • MSP/MSSP
    • Privacy
    • Security
    • ISO/IEC 27001:2022 Training & Certification
    • Secure DevOps
    • InfoSec Risk Management
    • Incident Response Planning
    • Artificial intelligence Readiness Offering
    • AppSec-as-a-Service
    • CISO As A Service
    • DPO As A Service
    • Security Monitoring
    • Security Operations
    • Awareness Training
  • Frameworks
    • CPA
    • CCPA/CPRA
    • GDPR
    • ISO 27001:2022
    • NIST 800-171
    • NIST 800-53
    • US Privacy Laws
  • News
  • Careers
    • DPO
    • CISO
  • Partners
  • About Us
    • Privacy Notice
    • Cookie Policy
  • Contact Us

MSSP Monitoring

November 5, 2025 By Carlin Dornbusch

Are your critical assets under management, under protection, or even monitored?

The need for business environments to establish and maintain a currency around their security posture has never been greater. As criminal activities increase and the advances in technology increase by the threat actors, today’s businesses need to stay in front of these threats through proactive security monitoring methods and mature response capabilities.

By just having your assets under a monitoring solution, it can greatly reduce the business’s risk to threats. Not only will the monitoring be an eye opening experience for the first-time consumer, but it will also aid in identifying real threats from basic events.

Some of the immediate values to security event monitoring from an MSSP are:

  • Cost Effective, and pay as you need
  • Easily Deployed and Managed
  • Compliance Supporting
  • Just-in Time Expertise

MSSP’s monitoring is usually a 3-year fixed contract with the ability to add more resources as your business grows. It can also come with 24×7 monitoring and support, allowing you to sleep well at night and put more resources into core business activities. Some of the better MSSP’s can even provide the service at a cost that does not include any data transfer fees, which in many cases make the solution much more expensive depending on the cyber noise in the environment. Most MSSPs allow you to upgrade the service to a “management” level, which includes their responsibility for patching and updating the monitored devices.

So, how do businesses keep up with the threats? What technologies should the business invest in to reduce these risks? Who in the organization has the time and experience to ensure appropriate security monitoring is enabled and monitored? Where can the business find acceptable solutions at a reasonable price?

To help companies defend against the modern threats of today, American Cyber Security Management offers its Security Monitoring offering. The Security Monitoring offering is designed to provide security event monitoring at a fraction of the cost. The technology solution is coupled with a top-down asset assessment, monitoring policy updates, and board-level metrics.

ACSM’s Security Monitoring offering helps businesses understand their threats, defend against attacks, and create a visible set of metrics and alerts allowing the business to attend to more important efforts. ACSM’s Security Monitoring allows the appropriate level of executive visibility and management for the business to perform at a more risk-free rate. Learn more about ACSM’s security and privacy offerings at the link below.

Security Monitoring

AmericanCSM.com helps its clients by outlining a Secure IT Environment (S.I.T.E.), where a variety of services can be selectively engaged to meet your specific business needs. You can read more about our MSP/MSSP offerings here https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/ We can set up an initial discovery meeting to help you map these services to your needs and deliver quick quoting to demonstrate the values of the MSP/MSSP.

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cybersecurity, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

2025 Cyber Resilience Awareness Day

October 15, 2025 By Carlin Dornbusch

Happy Cyber Resilience Awareness Day!

Did you know that one of the first computer viruses was created in 1971? It was called Creeper, and while it was a harmless experiment, it proved the concept of a self-replicating computer program. And then, the creator made —yep, you guessed it —the first antivirus program, called Reaper, designed to find and remove the Creeper software.

Look at how far we’ve come since 1971. Hackers can breach complex security networks, access millions of Personal Identifiable Information (PII) records, hold the stewards for ransom until paid in virtual currency, and then sell that information to another entity that can analyze it and use it for more harmful purposes. And this is after our antivirus software has advanced significantly, is able to be quickly updated, and can even lock down specific systems when attacks are detected.

History has shown that mankind is fallible. We can misconfigure security controls, forget, be careless, get distracted, and even act maliciously. Becoming cyber resilient means having the ability to predict, withstand, recover from, and adapt to threats.

Here are some areas that business leadership should review and ensure they have the resiliency they need:

  • Can you adequately PREVENT a cyber incident?
  • Can you DETECT a security event?
  • Can you DETERMINE the difference between an event and an incident?
  • Can you RESPOND and CONTAIN the situation?
  • And then are you able to RECOVER from the incident?

As we know, a layered security approach is essential, and no single product can address every threat. Consider your resilience, align your controls with a risk-based strategy, and train your teams through table-top exercises and role-playing processes.

ACSM has been helping businesses protect their assets and enhance their security and privacy posture since 2006. Our experienced team can assist your business in identifying cyber vulnerabilities and potential threats, as well as strengthening your security, privacy, and compliance efforts. Our services include penetration testing, maturity assessments, cybersecurity and privacy implementation support, CISO-as-a-Service, DPO-as-a-Service, and a variety of MSP and MSSP offerings, among others.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

Choosing your MSP/MSSP Services

October 8, 2025 By Carlin Dornbusch

Now that you have decided to use an MSP/MSSP, more detailed thoughts can be put towards “dialing-in” your specific MSP/MSSP services. We have found an easy way to break down this vast area of services is to think about a pancake layer of Infrastructure, IT, Security, Strategy and then Compliance. At ACSM we call this a Secure Information Technology Environment (S.I.T.E). We then look at each area and break them down into sub-components. This allows the IT leader to think through their specific needs more easily. You can see a diagram of these areas and our breakdown here: https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/

Areas of Consideration as you look across the pancake layers:

  • What unique and specific needs of IT do you have now?
  • Do you have enough security? Are you considering all of your threats?
  • Look at Backup and Recovery and Ransomware Protection
  • How much Compliance Support do you need?
  • Focus on Resiliency for critical solutions
  • Use the lens of Incident Management when looking at your architecture

Here at ACSM we can help you define your proper architecture and cut through a lot of the vendor hype in the market. Our strategic consulting can help you save time and money, as well as build resilient and highly secured environments.

How ACSM helps with its S.I.T.E. Offering:

  • Fast Migration and Adoption
  • Strategic Alignment and Communications
  • Risk Quantification and Mitigation
  • Reduced overall IT spend
  • 3rd Party Support
  • Meet Compliance levels

AmericanCSM.com helps its clients by outlining a Secure IT Environment (S.I.T.E.), where a variety of services can be selectively engaged to meet your specific business needs. You can read more about our MSP/MSSP offerings here https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/ 

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cyber security, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

CCPA Risk Assessment

September 23, 2025 By Carlin Dornbusch

Are you ready for the new audits and assessments that the California Privacy Protection Agency (“CPPA”) require? In July 2025, the CPPA updated the California Consumer Privacy Act (CCPA”) to require businesses to perform Risk Assessments and Cybersecurity Audits. The Risk Assessments apply to businesses that are selling or sharing information, using automated decision-making technology (“ADMT”) to make significant decisions or to infer personal attributes, or using Personal Information to train ADMT.

The annual Security Audits should cover the following areas that support Personal Information:

  • User Authentication
  • Encryption
  • Access Controls
  • Inventory management
  • Secure Hardware and Software Configurations
  • Network Segmentation
  • Network Monitoring and Defense
  • Penetration Testing and Vulnerability Management
  • Audit log Management
  • Data Retention and Data Disposal
  • Anti-virus, anti-malware Protection
  • Incident Response

Once again, the CPPA is concerned about how businesses handle data and will now be enforcing these new controls of CCPA on December 31, 2027, and April 1, 2028, respectively. (There are specific deadlines for the Cybersecurity Audits that depend on the business revenue size, with smaller businesses having until April 1, 2030 to meet compliance.)

Your privacy assessments or data mappings should show the business what data is being sold or shared, in order to help prepare you for your targeted risk assessments and the required cybersecurity audits. So be sure to have these artifacts completed before beginning the newly required Risk Assessments or Security Audits.

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cyber security, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

How best to choose a MSP/MSSP?

August 27, 2025 By Carlin Dornbusch

Why use an MSP or MSSP?

Outsourcing your IT and Security functions can be intimidating the first time. Most folks are fearful of losing control or unsure how to manage the transition. At AmericanCSM.com we help our clients in this transition, so that maximum operational gains and lowest financial impact can be realized. Below are some benefits and considerations for choosing an MSP/MSSP.

Immediate and Long-term values of using an MSP/MSSP

  • Cost Effective
  • Easily Managed
  • Compliance Supporting
  • Just-in Time Expertise

With a flat monthly fee, your IT management can be more predictable and not need larger investments for hardware and software. Your IT environment can now be managed by fewer internal resources, while the MSP handles all the mundane tasks of patching, monitoring and change management for you. You might even be able to accelerate getting to a specific level of compliance like HIPAA, SOC2, or even ISO-27001, than if you were doing it all yourself. The skill sets needed to manage most environments is broad, with a deep understanding of a variety of security and compliance issues. The MSP/MSSP services allow you to engage specialized resources in a just-in-time model so that you can focus on your business and not the management of specialized staff.

AmericanCSM.com helps its clients by outlining a Secure IT Environment (S.I.T.E.), where a variety of services can be selectively engaged to meet your specific business needs. You can read more about our MSP/MSSP offerings here https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/ We can set up an initial discovery meeting to help you map these services to your needs and deliver quick quoting to demonstrate the values of the MSP/MSSP.

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cyber security, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 25
  • Go to Next Page »
  • ISSA
  • ISACA
  • ISC2
  • IAPP
  • CSA
  • CIS
  • Privacy Notice
  • Cookie Policy
  • Services
  • Frameworks
  • News
  • Careers
  • Partners
  • About Us
  • Contact Us

Copyright © 2025 American Cyber Security Management