• Skip to primary navigation
  • Skip to main content

American Cyber Security Management

Secure and certify all your data and processes

  • LinkedIn
  • Twitter
  • YouTube
  • Services
    • MSP/MSSP
    • Privacy
    • Security
    • ISO/IEC 27001:2022 Training & Certification
    • Secure DevOps
    • InfoSec Risk Management
    • Incident Response Planning
    • Artificial intelligence Readiness Offering
    • AppSec-as-a-Service
    • CISO As A Service
    • DPO As A Service
    • Security Monitoring
    • Security Operations
    • Awareness Training
  • Frameworks
    • CPA
    • CCPA/CPRA
    • GDPR
    • ISO 27001:2022
    • NIST 800-171
    • NIST 800-53
    • US Privacy Laws
  • News
  • Careers
    • DPO
    • CISO
  • Partners
  • About Us
    • Privacy Notice
    • Cookie Policy
  • Contact Us

Navigating Cybersecurity in Finance: The Critical Role of Pen Testing

February 27, 2024 By Paul Herbka

Navigating Cybersecurity in Finance: The Critical Role of Penetration Testing

In a world where digital transactions are the backbone of the financial sector, the importance of robust cybersecurity measures cannot be overstated. The positive impact of penetration testing on financial institutions is crucial. This practice is not just a technical necessity; it’s a strategic imperative for maintaining trust, ensuring security, and achieving compliance with regulations like the Gramm-Leach-Bliley Act (GLBA).

The Cybersecurity Imperative

The digital age has brought unparalleled convenience to financial services. However, it has also opened the floodgates to cyber threats that evolve daily. Financial institutions are prime targets for cybercriminals due to the wealth of sensitive data they hold. In this context, penetration testing emerges as a critical tool. It’s not merely about finding vulnerabilities; it’s about safeguarding the financial health of millions and the integrity of institutions that are pillars of the global economy.

Penetration Testing Unpacked

Penetration testing, or pen testing, is a simulated cyber-attack against your computer system to check for exploitable vulnerabilities. In the context of financial institutions, it’s a rigorous assessment that goes beyond surface-level security measures. According to the Federal Trade Commission’s Safeguards Rule, financial entities are mandated to regularly monitor and test the effectiveness of their safeguards. This includes conducting annual penetration testing and bi-annual vulnerability assessments to detect publicly known security vulnerabilities.  It goes on to say: “In addition, test whenever there are material changes to your operations or business arrangements and whenever there are circumstances you know or have reason to know may have a material impact on your information security program.”

Beyond Compliance

While compliance with regulations like the GLBA is a significant driver for penetration testing, the benefits extend far beyond meeting legal requirements. Pen tests offer a proactive approach to cybersecurity, allowing institutions to:

  • Identify and remediate vulnerabilities before they can be exploited.
  • Enhance security postures by understanding and mitigating risks.
  • Protect customer data and maintain trust, which is the cornerstone of financial services.
  • Avoid costly breaches that can lead to financial loss and damage to reputation.

Moreover, in an environment where operational changes are constant—be it through new technologies, mergers, or service expansions—penetration testing ensures that security measures are always aligned with the institution’s current state.

Implementing Best Practices

For financial institutions committed to maintaining the highest security standards, the following best practices are essential:

1. Regular Testing: Adhere to the FTC’s recommendation for annual penetration testing and semi-annual vulnerability assessments. Increase frequency whenever there are significant changes in your IT environment or operational structure.

2. Comprehensive Coverage: Ensure that your pen testing efforts cover all critical systems and applications, especially those involving customer data and financial transactions.

3. Expertise Matters: Engage with cybersecurity experts who specialize in financial systems. Their insights can provide nuanced understanding and tailored security strategies that generic solutions cannot.

4. Continuous Improvement: Use the insights gained from penetration tests to continuously refine and enhance your cybersecurity measures. This iterative process is key to staying ahead of emerging threats.

5. Transparency and Communication: Keep stakeholders informed about your cybersecurity efforts. Demonstrating a commitment to security can reinforce trust among customers, partners, and regulators.

In conclusion, penetration testing is not just a regulatory checkbox for financial institutions; it’s a critical component of a comprehensive cybersecurity strategy. By embracing regular and thorough penetration testing, financial institutions can protect themselves and their customers from the ever-evolving landscape of cyber threats, ensuring both compliance and peace of mind in a digital world.

American Cyber Security Management is a leader in data privacy, cybersecurity, and Compliance. Our mission is to help enterprises protect their data from internal and external threats. We offer on-demand assessment, implementation, and sustainability services that focus on Privacy and Cybersecurity readiness and compliance, risk reduction, and mitigation. https://www.americancsm.com

Filed Under: Cyber Security News

The Strategic Importance of ISO 27001 Training for Certification Success

February 12, 2024 By Paul Herbka

The Strategic Importance of ISO 27001 Training for Certification Success

In our continuous endeavor to safeguard sensitive information in an increasingly digital world, the ISO 27001 certification emerges as a critical standard for establishing, implementing, maintaining, and improving an Information Security Management System (ISMS). Achieving this certification is a significant milestone, reflecting an organization’s dedication to information security. However, the journey to certification is complex, requiring a deep understanding of the standard’s requirements and best practices. This is where the indispensable role of ISO 27001 training becomes evident. Engaging in ISO 27001 training is not merely beneficial but crucial for those aiming for ISO 27001 certification.

Key Advantages of ISO 27001 Training

1. Comprehensive Understanding: ISO 27001 training offers an in-depth exploration of the standard, equipping professionals with the knowledge to design, implement, and manage an effective ISMS tailored to their organization’s specific needs.

2. Mastery in Risk Management: Central to ISO 27001 is the successful management of information security risks. Training provides the methodologies and analytical tools necessary for identifying, evaluating, and mitigating risks, ensuring the resilience and reliability of the ISMS.

3. Leadership and Influence: Advanced training cultivates essential leadership qualities, enabling professionals to champion the implementation of an ISMS and promote a pervasive awareness of information security.

4. Regulatory Insight and Compliance: ISO 27001 training emphasizes the alignment of the ISMS with global regulatory requirements, ensuring that organizations not only achieve compliance but also adopt a proactive stance towards information security governance.

5. Market Differentiation: In a competitive landscape, organizations certified in ISO 27001 distinguish themselves, demonstrating their unwavering commitment to information security.

Why Now Is the Time for ISO 27001 Training

1. Dynamic Cybersecurity Threats: Immediate training prepares organizations to swiftly adapt their ISMS to effectively counteract the sophisticated threats that are emerging daily.

2. Regulatory Evolution: As global data protection regulations become more stringent, understanding and integrating these requirements into your ISMS is crucial. Training ensures your organization remains compliant and ahead of regulatory changes.

3. Financial Prudence: Implementing an ISMS without the foundational knowledge gained from training can lead to inefficient resource allocation and increased vulnerability to security breaches, with potentially severe financial repercussions.

4. Professional Development: For individuals, ISO 27001 training is an investment in personal career growth, enhancing one’s value and expertise in the competitive field of information security.

The Three Main Courses Offered

1. ISO 27001:2022 Foundation: This course lays the groundwork, focusing on the fundamental elements of an Information Security Management System (ISMS). It is designed to help participants understand the different modules of ISMS, appreciate policies, procedures, and performance measurements, and grasp the importance of management commitment, internal audit, management review, and continual improvement.

2. ISO 27001:2022 Lead Implementer: Aimed at those responsible for or involved in implementing or adjusting an ISMS, this course provides in-depth knowledge on securely implementing and maintaining an ISMS based on ISO/IEC 27001:2022 requirements. It covers the implementation of an ISMS, maintenance and improvement practices, effective controls, best practices, and a framework for implementation.

3. ISO 27001:2022 Lead Auditor: This course is designed for individuals planning and carrying out internal or external audits of an ISMS. It covers mastering audit techniques, managing an audit program and team, handling communication with customers, and resolving conflicts, all in compliance with ISO 19011 and ISO/IEC 17021-1 standards.

Why Choose AmericanCSM.com for Your ISO 27001 Training?

·   Flexibility

·   Comprehensiveness

·   Practical Applicability

Our training courses are distinguished by their flexibility, comprehensiveness, and practical applicability. Whether you opt for the self-paced learning for convenience or the live virtual instructor-led sessions for interactive learning, you are assured of a training experience that not only prepares you for certification but also equips you with the expertise to apply ISO 27001 principles in real-world scenarios.

The training is specifically designed for various professionals, including project managers, consultants, expert advisors, auditors, and technical experts. With competitive pricing, AmericanCSM.com makes expert-led ISO 27001 education accessible no matter where you are in your professional life.

Filed Under: Cyber Security News

Control Your Data: Mastering Privacy & Cybersecurity with ACSM in 2024

January 25, 2024 By Paul Herbka

Overview:

January 28, 2024 is Data Privacy Day.  We invite you to celebrate it while embracing better privacy this year for both you and your business.

Title: Control Your Data: Mastering Privacy & Cybersecurity with ACSM in 2024

In an era where data is more valuable than ever, Data Privacy Day serves as a crucial reminder of our responsibility to protect it. At American Cyber Security Management (ACSM), we believe that safeguarding your data is not just a necessity but an important journey towards digital resilience.

Data Privacy and Cybersecurity are inseparable in the digital age. While privacy focuses on safeguarding your personal and customer data, cybersecurity extends its shield to protect you and your customer data, and your company from digital threats. In today’s interconnected world, you cannot support a privacy program without cybersecurity.  ACSM is dedicated to fortifying this relationship through comprehensive Privacy Assessments and Security Assessments.

Our assessments don’t just identify your gaps; they pave the way for actionable and empowering strategies. Understanding your current state is the first step in a journey toward enhanced privacy and tighter security. This proactive approach is essential for businesses, especially in a landscape where privacy laws are swiftly evolving.

“I’m not a privacy expert” should not be a barrier to protecting your data. In 2024, privacy is not just a compliance requirement but a cornerstone of trust in business. ACSM aims to shift the narrative from viewing privacy as a challenge to an opportunity for growth, differentiation, and customer trust.

Enhancing privacy awareness doesn’t have to break the bank. Utilize a variety of free and low-cost tools to ensure your data, and that of your customers, remains secure. Investing in privacy is investing in the future of your business.

This Data Privacy Day, take the pledge to take control of your data. Whether as an individual or a business, every step towards better privacy is a step towards a safer digital world. Join ACSM in this vital mission. Together, we can make a difference.

As we celebrate Data Privacy Day, let’s not only stop and think but also act. Your journey with ACSM towards enhanced data privacy and cybersecurity begins with awareness and is fulfilled through action. Let’s transform our digital world into a safer, more private space for all.

Privacy Awareness Reminder for individuals:
There has been a lot of activity in the privacy arena. As you surf the web, be sure you look at privacy statements.  Read the details, determine where your data is going, and more importantly, understand what data will be captured and how it will be used. Also ensure you are looking at cookie settings.  Pick the ones that you want.  Don’t just accept all or go with the default.  It’s your data, be deliberate!

Filed Under: Cyber Security News

International Fraud Awareness Week: Tips and Resources to keep you safe!

November 13, 2023 By American Cyber Security Management

International Fraud Awareness Week is Nov. 12-18, 2023. 

Fraud comes in many forms and packages, including scams.  Here are some important tips and reminders to keep you safe and to highlight just some of the many scams and fraud approaches.

Since November 12-18, 2023 is International Fraud Awareness Week, we wanted to include some important tips and resources as well as mention some of the key scams we see this time of year.  Scams are fraud targeting employees and individuals both at home and at work.

Ways to SPOT a Scam before you’re a victim

1. Scammers often PRETEND to be from an organization you know.

Scammers often pretend to be contacting you on behalf of the government. They might use a real name, like the FTC, Social Security Administration, IRS, or Medicare, or make up a name that sounds official. Some pretend to be from a business you know, like a utility company, a tech company, delivery company (FedEx, UPS, Amazon, USPS) or even a charity asking for donations.

They use technology to change the phone number that appears on your caller ID. Be aware that the name and number you see might not be real.

2. Scammers cause emotion when they say there’s a PROBLEM or a PRIZE.

They might say you’re in trouble with the government. Or you owe money. Or someone in your family had an emergency. Or that there’s a virus on your computer.

Some scammers say there’s a problem with one of your accounts and that you need to verify some information.

Others will lie and say you won money in a lottery or sweepstakes but have to pay a fee to get it.

3. Scammers often PRESSURE you to act immediately.

Scammers want you to act before you have time to think. If you’re on the phone, they might tell you not to hang up so you can’t check out their story.

They might threaten to arrest you, sue you, take away your driver’s or business license, or deport you. They might say your computer is about to be corrupted.

4. Scammers often tell you to PAY in a specific way.

They often insist that you can only pay by using cryptocurrency, wiring money through a company like MoneyGram or Western Union, using a payment app, or putting money on a gift card and then giving them the numbers on the back of the card.

Some will send you a check (that will later turn out to be fake), then tell you to deposit it and send them money.

What to do to AVOID being a victim of a Scam:

Block unwanted calls and text messages. Take steps to block unwanted calls and to filter unwanted text messages.

Don’t give your personal or financial information in response to a request that you didn’t expect. Honest organizations won’t call, email, or text to ask for your personal information, like your Social Security, bank account, or credit card numbers.

If you get an email or text message from a company you do business with and you think it’s real, it’s still best not to click on any links. Instead, contact them using a website you know is trustworthy. Or look up their phone number. Don’t call a number they gave you or the number from your caller ID.

Resist the pressure to act immediately. Honest businesses will give you time to make a decision. Anyone who pressures you to pay or give them your personal information is a scammer.

Know how scammers tell you to pay. Never pay someone who insists that you can only pay with cryptocurrency, a wire transfer service like Western Union or MoneyGram, a payment app, or a gift card. And never deposit a check and send money back to someone.

Stop and talk to someone you trust. Before you do anything else, tell someone — a friend, a family member, a neighbor — what happened. Talking about it could help you realize it’s a scam.

Reminders about the dangers of Links and attachments:

  • Surfing the Web
  • Reading and Responding to:
    • Emails
    • Texts
    • Instant Messages

Remember that the bad guys want you to click on links or open attachments – that is how they “phish” you.  If the email/text/instant message seems odd – don’t click on the link, don’t open the attachment.  If it says it is from your “bank”, “Amazon”, “UPS”, “IRS”, “FBI”, “USPS”, etc. – don’t click on those – these are common “phishing” scams – wanting you to worry or be curious and then open them.  Others will simply send you a text or instant message that simply says:

  • Check this out: {vague but malicious link here}
  • Did you see this? {vague but malicious link here}
  • Shipping confirmation required: {vague but malicious link here}
  • Account will be locked, confirm information here: {vague or malicious link here}

Instead – if you are expecting something from Amazon, just login to your normal Amazon account like you normally would. (Don’t use the link in the email/text/IM.)  Best to bookmark your main locations, like your bank, amazon, etc. so you know they are the correct links.   If it says it is from a bank or credit card company, you can always call the number on your bill or the back of your credit card.

Privacy Awareness Reminder:
There has been a lot of activity on the privacy side of the house as well. As you surf the web, be sure you look at privacy statements.  Read the details, determine where your data is going, and more importantly, understand what data will be captured and how it will be used. Also ensure you are looking at cookie settings.  Pick the ones that you want.  Don’t just accept all or go with the default.  It’s your data, be deliberate!

Filed Under: Cyber Security News

Cyber Security Awareness Month:  Tips and Reminders to keep you safe!

October 5, 2023 By American Cyber Security Management

Overview:

October is Cybersecurity Awareness Month.  Here are some important tips and reminders to keep you safe while using technology on all your devices.

Key Points:Blog Post:  Cyber Security Awareness Month – Tips and Reminders:

Since October is Cyber Security Awareness Month, we thought a few tips and common reminders would be helpful.  We also wanted to highlight some of the recent breaches and what they remind us about security. 

In the news (Q3 notable breaches):

You may have heard of one or more of these breaches listed below. The number and frequency of breaches do not seem to be slowing.  We have included hints and tips if you were affected by these breaches.

Here are some of the companies affected by security breaches so far in Q3 2023:

MGM 

What we learned – Remember to train your helpdesk teams how to vet users in a secure way.

Caesars

What we learned – This was basically due to a phishing email, so stay alert for phishing emails.

Tips: 

  1. What should you do?  If you have an account at/with any of these companies, you should change your password if you have not already.  You should strengthen it and not just make it similar with a different number, character, or symbol.  Completely change the password and make it at least 16 characters long using letters in both upper-case and lower-case, a number, and special character(s) if allowed by that website/application.
  2. Not sure if your password for these or any other site has been breached?  Use this site to check:
    1. https://haveibeenpwned.com/
    2. Check your email(s)
  3. Not sure how to make an easy to remember, but hard-to-guess password – see the reminder below.

Password Security Reminders:

  • Best security practices suggest you have 16 characters long, including a mix of uppercase letters, lowercase letters, numbers, and special characters.
  • Best to not just use dictionary words, but first letters of a phrase – so they are not dictionary words – so perhaps pick a favorite song and use the first letters of each word – so “somewhere over the rainbow skies are blue” becomes “Sotrsab” to use as part of  your password. You could then use another phrase from a different source like a book:  “It was the best of times, it was the worst of times” This becomes “iwtbotiwtwot” It would be easy to remember, but harder to guess.
  • Then add some numbers and special characters: So now you have “Sotr57sab!iwtbotiwtwot” and now you have a very long, very strong password that is easy to remember.  Please don’t use this exact one – since this is a post – many people will have seen it, including perhaps some attackers.  So use your own song/book/poem, etc.
  • Remember, don’t share that password with anyone.  Don’t write it down on a sticky note under your keyboard or laptop, don’t send passwords in email – as email is not secure, same with Instant messaging, and other similar messaging apps.
  • Want an easier solution, if you don’t want to remember all of these passwords, you can use a password manager application.  Then, you only have to remember one long and strong password to get into that application.  It then fills in your different passwords for each application.  If you are picking a password manager password – it should be 20 characters or more.  

Security Best Practices for:

  • Surfing the Web
  • Reading and Responding to:
    • Emails
    • Texts
    • Instant Messages

Remember that the bad guys want you to click on links or open attachments – that is how they “phish” you.  If the email/text/instant message seems odd – don’t click on the link, don’t open the attachment.  If it says it is from your “bank”, “Amazon”, “UPS”, “IRS”, “FBI”, “USPS”, etc. – don’t click on those – these are common “phishing” scams – wanting you to worry or be curious and then open them.  Others will simply send you a text or instant message that simple says:

  • Check this out:  {vague but malicious link here}
  • Did you see this? {vague but malicious link here}
  • Shipping confirmation required: {vague but malicious link here}
  • Account will be locked, confirm information here:  {vague or malicious link here}

Instead – if you are expecting something from Amazon, just login to your normal Amazon account like you normally would. (Don’t use the link in the email/text/IM.)  Best to bookmark your main locations, like your bank, amazon, etc. so you know they are the correct links.   If it says it is from a bank or credit card company, you can always call the number on your bill or the back of your credit card.

Privacy Awareness Reminder:
There has been a lot of activity on the privacy side of the house as well. As you surf the web, be sure you look at privacy statements.  Read the details, determine where your data is going, and more importantly, understand what data will be captured and how it will be used. Also ensure you are looking at cookie settings.  Pick the ones that you want.  Don’t just accept all or go with the default.  It’s your data, be deliberate!

Filed Under: Cyber Security News

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Interim pages omitted …
  • Page 25
  • Go to Next Page »
  • ISSA
  • ISACA
  • ISC2
  • IAPP
  • CSA
  • CIS
  • Privacy Notice
  • Cookie Policy
  • Services
  • Frameworks
  • News
  • Careers
  • Partners
  • About Us
  • Contact Us

Copyright © 2026 American Cyber Security Management