Enhancing Cyber Incident Reporting with CISA's New Services Portal
The new CISA Services Portal offers a secure platform packed with enhanced functionalities tailored for effective cyber incident reporting. One of the standout features of this portal is its integration with login.gov credentials, ensuring a seamless and secure login experience for users.
The portal is designed to cater to the diverse needs of its users. It allows for the saving and updating of reports, facilitating ongoing incident tracking and management. Moreover, users can share submitted reports with colleagues or clients, making third-party reporting more efficient.
Automating Export for Windows Events Logs with PowerShell
In Windows, the Event Viewer is the most common starting point for any activity analysis. The three core logs (Application, System and Security) provide details on information, warnings, errors and critical events. You can also configure Windows to log relevant cybersecurity activities like permission elevations and file deletions. The common issue we see is that the logs do not hold enough history for most auditing requirements. While you can increase the log sizes in Windows, this is not recommended. It will increase disk and performance demands on your servers. Also, Event Viewer is not a robust search and analysis tool. The best approach is to export your events. In this article, I take a straightforward approach to get the event logs exported to CSV files. The CSV format is much easier to work with than the proprietary EVTX Windows format. This approach does not require purchasing any software and relies solely on PowerShell. Once you have your logs exported, you can keep them as long as required and use the logs with other tools for analysis and reporting.
How’s Your Hygiene? Poor Password Hygiene Leaves Your Organization Vulnerable to Cybersecurity Attacks.
Where do you save your passwords? Sticky note? Phone? Computer? Or do you create passwords that you can memorize like your partner’s name and birthday, or the name of your company followed by the date you were hired? If you do any of these things, my friend, you have poor password hygiene.
Are You Thankful for Your MSP? Our Customers Are.
Utilizing the Cloud to Store Documents? You May Want to Secure That Too.
Put Your Defenses Up! It’s Cybersecurity Awareness Month!
19 years ago, the month of October was named Cybersecurity Awareness Month. This month is devoted to “helping individuals protect themselves online as threats to technology and confidential data become more commonplace” (cisa.gov).