• Skip to primary navigation
  • Skip to main content

American Cyber Security Management

Secure and certify all your data and processes

  • LinkedIn
  • Twitter
  • YouTube
  • Services
    • MSP/MSSP
    • Privacy
    • Security
    • ISO/IEC 27001:2022 Training & Certification
    • Secure DevOps
    • InfoSec Risk Management
    • Incident Response Planning
    • Artificial intelligence Readiness Offering
    • AppSec-as-a-Service
    • CISO As A Service
    • DPO As A Service
    • Security Monitoring
    • Security Operations
    • Awareness Training
  • Frameworks
    • CPA
    • CCPA/CPRA
    • GDPR
    • ISO 27001:2022
    • NIST 800-171
    • NIST 800-53
    • US Privacy Laws
  • News
  • Careers
    • DPO
    • CISO
  • Partners
  • About Us
    • Privacy Notice
    • Cookie Policy
  • Contact Us

ACSM Work From Home advice

March 18, 2020 By American Cyber Security Management

As most businesses implement Work From Home capabilities, American Cyber Security Management (ACSM) wants to remind the workforce that security best practices still need to be followed. We recommend some basic efforts to help keep your systems secure while at home or working remotely.

During this pandemic, threat actors have ramped up their efforts to compromise emails, gain inappropriate access, and provide misleading information. Our own clients have seen a noted increase in phishing emails recently. We are also seeing U.S. national systems experience an increase of attacks.

Even the US Health and Human Services website was compromised:  (https://www.infosecurity-magazine.com/news/us-health-department-hacked/). 

Here are some basic precautions you can take while working at home:

  1. Change the Default Password on your home router.
    1. Be sure to use a complex password of 10+ characters
    2. Also, specifically, if you are an Xfinity/Comcast user, be sure to disable the “Xfinity” default SSID. This default configuration broadcasts an Xfinity SSID and allows any Xfinity user to login to the access point through their Xfinity account and utilize your wifi system.
  2. Continue to be diligent in not clicking on URL links in your emails. More phishing emails will be experienced during this time and employees need to be wary of the increase in this activity.
  3. Once again, always discuss requests that come for “movement of funds”. Threat actors will continue to try to persuade employees to move and re-allocate company funds to a false account, especially for currently sensitive services like company travel or healthcare-related costs (e.g., facilities sanitation)
    1. Ensure the request is legitimate
    2. Check with the requestor directly – Video Conf, phone call
    3. Utilize fax numbers if you believe the email has been compromised.
  4. When responding to emails, ensure correct emails are used. Just do a quick double-check that you are sending emails to the correct person. Check for malicious/false emails that may have been added to the email list.

Additional precautions recommended by the Center for Internet Security are (https://www.cisecurity.org/blog/5-network-security-remedies-for-telework/):

  1. Practice smart password management and enable two-factor authentication (2FA) wherever possible.
    1. This includes accessing the administrative router/modem, Internet Service Provider (ISP) web portal, or a mobile app used for home network management. Anyone with the ability to access these platforms may be able to access sensitive information traversing the home network and modify critical security settings within the network.
  2. Enable automatic updates for all routers and modems.
    1. Software updates are extremely important as new security flaws are constantly discovered. Simply installing updates from the device manufacturer mitigates many of these problems. This is best accomplished by enabling “auto-update” with the device’s administration page.
  3. Turn off WPS and UPnP.
    1. Wireless Protected Setup (WPS) was initially designed as a user-friendly method for new devices to connect to a WiFi network. Unfortunately, it’s been found to allow attackers to connect to WiFi networks without permission. Universal Plug and Play (UPnP) is a network protocol suite that allows devices on a network to easily communicate but has been found to contain numerous and severe security flaws. Getting these two settings correct can have a large positive impact on home network security.
  4. Turn on WPA2 or WPA3.
    1. Old and ineffective types of cryptography plague older network devices. Ensuring strong forms of cryptography are in use within home networks can thwart others from viewing sensitive information without authorization. At a minimum, configure WPA2 for home use.
  5. Configure the router, or modem, firewall.
    1. Firewalls help prevent malicious network traffic attempting to enter a network from reaching specific devices. Firewalls generally come built-in to most home routers but they must be properly enabled.

American Cyber Security Management is a leader in data privacy, cybersecurity, and secure DevOps. Our mission is to help enterprises protect their data from internal and external threats. We offer on-demand assessment, implementation, and sustainability services that focus on GDPR readiness and compliance, risk reduction and mitigation, and application reliability, integrity, and security.    https://www.americancsm.com

Filed Under: Cyber Security News

ACSM offers free services for non-profits during the pandemic

March 18, 2020 By American Cyber Security Management

American Cyber Security Management (ACSM) is offering its non-profit clients free critical services during the month of March and into April 2020. ACSM is aware that many non-profits, who are already struggling with IT, Security, and Privacy efforts, are depleted of internal resources during the current pandemic. As businesses try to enable their remote workforces and threat actors to increase their efforts in a time of crisis, it is more important than ever that security-first approaches be taken in order to safeguard business and customer data. ACSM is offering services for infrastructure security, network reviews, Business Continuity Planning and Disaster Recovery, control review and configuration, and other needed services to help safely enable the mobile workforce. ACSM is also offering its incident response services to help identify and control malicious behavior.

American Cyber Security Management is a leader in data privacy, cybersecurity, and secure DevOps. Our mission is to help enterprises protect their data from internal and external threats. We offer on-demand assessment, implementation, and sustainability services that focus on GDPR, CCPA, readiness and compliance, risk reduction and mitigation, and application reliability, integrity, and security. https://www.americancsm.com

Filed Under: Cyber Security News

Join us for our webinar! Preparing for CCPA Compliance

February 5, 2020 By American Cyber Security Management

As companies climb higher up the digital transformation ladder, they accumulate large amounts of data that may contain personally identifiable information (PII), a valuable asset to marketers… and cybercriminals. As data collection, storage, and processing continues to rise, threats to PII also increase.

To help mitigate these threats, California enacted a ground-breaking new privacy act last year – equivalent to EU’s GDPR. Not sure if your company is affected by the California Consumer Privacy Act and/or need tips on how to get compliant fast?

Register for this month’s webinar, with featured guests Nancy Free, Chief Compliance & Data Privacy Officer at Armor, and Carlin Dornbusch, President & CISSP at American Cyber Security Management!

Key takeaways include:

  • Who’s affected by the new legislation and what CCPA entails from a legal and compliance perspective
  • The impact CCPA has on all business, not just those directly affected
  • Challenges of CCPA compliance and recommendations

Webinar: Privacy & Security: Preparing for CCPA Compliance

When: Wednesday, February 19 at 1 p.m. ET
*Armor is an (ISC)2 submitter. Attend to earn CPE credits!

Register Now!

Nancy Free, Chief Compliance & Data Privacy Officer, Armor

Nancy Free serves as the Chief Compliance and Data Privacy Officer at Armor. She is responsible for Armor’s data privacy mission and for the governance, risk, and compliance side of Armor’s security mission. With more than 20 years of experience in information technology and assurance, Nancy is a trusted advisor to Armor prospects and customers on GDPR, PCI, HIPAA (HITRUST), ISO-27001, and other privacy regulations and compliance frameworks, helping them understand the impact of these standards on their businesses. Nancy has implemented GRC and ERM programs for Fortune 500 companies within the transportation, energy, and retail industries, assuring compliance with many regulations and industry frameworks. Nancy is an active participant in local chapters of the North Texas Crime Commission (NTCC), Network of Executive Women (NEW), and Information Systems Security Association (ISSA), currently serving as Deputy Director of the North Texas ISSA Women in Security special interest group (WIS-SIG).

Carlin Dornbusch, CISSP, American Cyber Security Management

Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of modern threats and emerging compliance. Carlin serves as an IAPP Denver KnowledgeNet CoChair, ISSA Denver Special Interest Group leader, and an active member of the Cloud Security Alliance (CSA). Carlin also holds an active Certified Information Systems Security Professional (CISSP) certificate from ISC2.

Host:

Michael Mayes, Sr. Writer & Researcher, Armor

Michael Mayes is a senior writer and researcher at Armor in Richardson, Texas. His career in technology communications includes work with the Human Genome Project, handheld software during the Palm and Pocket PC era, blockchain development, and cybersecurity. He began his research in black markets in 2013 during a PhD year in professional and technical writing at the University of Memphis where he wrote on the early days of Bitcoin and its defining proof of concept, the Silk Road.

Filed Under: Cyber Security News

Selection to IAPP KnowledgeNet Chapter Chair

November 27, 2019 By American Cyber Security Management

American Cyber Security Management (ACSM) is proud to announce that it’s President, Carlin Dornbusch, has been selected to serve as a KnowledgeNet Chair for the Denver/Boulder IAPP Chapter. ACSM is honored to participate at this level of privacy leadership. We believe that this is another step that ACSM is taking to help bring together the security and privacy practices in order to bring awareness to both functions in all business sizes. Carlin will begin his 2-year commitment on January 1, 2020.

As many small-to-medium-sized businesses struggle to implement new privacy programs for the new GDPR and CCPA governance, most are unable to afford the skilled full-time resources needed. These businesses struggle with understanding the new regulations and determining the applicability to their business. The determination of the right technologies and knowing how to effectively modify the existing business process are key to these changes. ACSM believes that this appointment will bring more support for these challenges and will increase the flow of information between security organizations like ISSA, CSA and ISC2 with IAPP.

American Cyber Security Management is a leader in data privacy, cybersecurity, and secure DevOps. Our mission is to help enterprises protect their data from internal and external threats. We offer on-demand assessment, implementation, and sustainability services that focus on GDPR readiness and compliance, risk reduction and mitigation, and application reliability, integrity, and security.    https://www.americancsm.com

Filed Under: Cyber Security News

ACSM at IBM Event Nov 12

November 6, 2019 By American Cyber Security Management

Come learn all about IBM’s Threat Management platform on Nov 12, 2019. ACSM privacy and security consultants will be on hand to discuss your specific needs and the IBM platform’s relevance to your organization.

Threat Management Proof of Technology Workshop

When: Nov 12, 2019, 8:30-3:00 MDT

Where: 4700 S. Syracuse Street Denver, CO 80237

What: QRadar SIEM & Resilient SOAR

IBM Security is pleased to bring to you our Threat Management Proof of Technology workshop with the market-leading IBM QRadar SIEM and Resilient Security Orchestration, Automation and Response (SOAR) Platform.

You will experience the solution in action to see how we integrate SIEM and SOAR solutions to effectively manage and respond to threats by streamlining detection, investigation, and response.

Agenda:

8:30 am – Registration and Breakfast

9:00 am – Threat Management (SOAR) Presentation

9:30 am – QRadar: Demo with Use Cases

  • Lateral Movement
  • Privilege Escalation – Offense ID 15
  • Phishing – Integration with Resilient Offense ID 13

10:30 am – Resilient: Demo with Use Cases

  • Phishing
  • Malware

11:30 am – i2: Threat Hunting and Cyber Link Analysis for Investigation – Insider Threat

12:30 pm – Lunch

1:30 pm – Anomaly Detection/Proactive Response

  • QRAW
  • QNI
  • UBA/Pulse

2:00 pm – Resilient Custom Configs and Privacy

2:30 pm – SOAR Wrap UP and Q&A

3:00 pm – Closing

Please register using this link:

https://community.ibm.com/community/user/security/events/event-description?CalendarEventKey=3ee8b78c-7c6b-4eaf-bca2-7fde48c79b63&CommunityKey=f9ea5420-0984-4345-ba7a-d93b4e2d4864

American Cyber Security Management is a leader in data privacy, cybersecurity, and secure DevOps. Our mission is to help enterprises protect their data from internal and external threats. We offer on-demand assessment, implementation, and sustainability services that focus on GDPR readiness and compliance, risk reduction and mitigation, and application reliability, integrity, and security. https://www.americancsm.com

Filed Under: Cyber Security News

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Interim pages omitted …
  • Page 25
  • Go to Next Page »
  • ISSA
  • ISACA
  • ISC2
  • IAPP
  • CSA
  • CIS
  • Privacy Notice
  • Cookie Policy
  • Services
  • Frameworks
  • News
  • Careers
  • Partners
  • About Us
  • Contact Us

Copyright © 2026 American Cyber Security Management