<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.newfathom.com/blogs/feed" rel="self" type="application/rss+xml"/><title>New Fathom IT - Blog</title><description>New Fathom IT - Blog</description><link>https://www.newfathom.com/blogs</link><lastBuildDate>Thu, 02 Apr 2026 17:22:04 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[They’re Not Breaking In. They’re Logging In.]]></title><link>https://www.newfathom.com/blogs/post/they-are-not-breaking-in-they-are-logging-in</link><description><![CDATA[For years, business security has been built around a simple idea: keep attackers out. Firewalls, antivirus, and endpoint protection all serve that pur ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_qyMVsBq6SJWvFn-lkETgZg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3TFtjq7eQVifdeKr8vRtWA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_l7oAJyNKSl6PgzrPvYxGuA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ydRqgfaMK0T-x1Bv68gw5g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ydRqgfaMK0T-x1Bv68gw5g"] .zpimage-container figure img { width: 200px ; height: 296.98px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-small zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/g72d14bc9ef66bde1d0aaf75038bc651f405bce4954026e35ffdc3a5a96d2a7909ba5175cb5f6a0ca5343d46f0a13c028a6794f76f8718319935364c008770fb9_1280.png" size="small" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_4vPtYKdVS3qSPW8RUteZHw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>They’re Not Breaking. They’re Logging In.</span></h2></div>
<div data-element-id="elm_urBf1Kv_SDeodS_qcYyGZA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:justify;">For years, business security has been built around a simple idea: keep attackers out. Firewalls, antivirus, and endpoint protection all serve that purpose, and for a long time, that approach made sense. Threats were largely external. If you could block the intrusion, you could protect the business.</p><p style="text-align:justify;">That’s no longer how most attacks work.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">Today, attackers aren’t forcing their way in. They’re logging in.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">The shift is subtle, but significant. Instead of exploiting software vulnerabilities, attackers are targeting people. A well-crafted phishing email, a fake login page, or a compromised session token is often all it takes. Once credentials are captured, the attacker doesn’t look like an intruder anymore—they look like a legitimate user.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">And that changes everything.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">When access appears normal, traditional security tools have very little to act on. There’s no obvious malware, no blocked connection, and no clear alert that something is wrong. From the system’s perspective, a valid username and password were used successfully. From a business perspective, however, the risk is substantial.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">Email accounts can be used to redirect payments or send fraudulent invoices. File systems can be accessed and sensitive information quietly exfiltrated. Internal communications can be monitored or impersonated. In many cases, the compromise isn’t discovered until after financial or operational damage has already occurred.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">One of the biggest challenges is how long these incidents can go unnoticed. It’s not uncommon for account compromises to remain undetected for days or even weeks. During that time, an attacker can operate freely within the environment, often leaving very little trace that would trigger a traditional alert.</p><p style="text-align:justify;">This is where we’re seeing a meaningful shift in how businesses approach security. Rather than focusing solely on protecting devices, organizations are beginning to focus on protecting identity.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">Identity Threat Detection and Response (ITDR) is one example of this shift. Instead of looking for malware or suspicious files, it monitors how accounts are being used. Things like impossible travel, unusual login patterns, or access from unfamiliar locations can indicate that a legitimate account is being misused.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">More importantly, these signals can be evaluated in real time. That changes the response window from days or weeks to minutes.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">The goal isn’t to replace existing security tools, but to close a gap that many businesses don’t realize exists. If attackers are getting in through valid credentials, then visibility into how those credentials are being used becomes critical.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">For small and mid-sized businesses especially, this shift is worth paying attention to. The question is no longer just whether your systems are protected from intrusion. It’s whether you would recognize if someone logged in who shouldn’t be there.</p><p style="text-align:justify;"><br></p><p style="text-align:justify;">Because increasingly, that’s what an attack looks like.</p></div>
<p></p></div></div><div data-element-id="elm_SxDVMMHLTYaUcMqjhQeKnA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Thu, 02 Apr 2026 14:52:00 -0700</pubDate></item><item><title><![CDATA[You Didn’t Start a Tech Company. But You’re Running One.]]></title><link>https://www.newfathom.com/blogs/post/the-accidental-it-department-why-small-businesses-are-carrying-more-tech-risk-than-they-realize</link><description><![CDATA[If you run a small business in 2026, you are running a technology operation. Whether you intended to or not. It rarely begins strategically. The tech s ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_MAvUlKXqS9eLe59UUphTSQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QPrfwNKrTiCiX0swE6JXRA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PnF7VTMNTe-H6hytAUeaaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_sAHQyQ_wEFYesiRoA82t6w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_sAHQyQ_wEFYesiRoA82t6w"] .zpimage-container figure img { width: 1110px ; height: 444.00px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/g4c603d010c76683d217f44ca0cb66b7320a1e9a37814e8e6205c6397aa3817c46ff4f71fe0f52179af7c7f1653d057bac920c85abfbe73fd73336ea0fcfe7b8d_1280.jpg" size="fit" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_IIudYHyNQJiFhNFq9R3miA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>You Didn’t Start a Tech Company. But You’re Running One.</span></span></h2></div>
<div data-element-id="elm_NlB_mUMeRMalcqAcNSpzpQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:left;"></div>
</div><div><div style="text-align:left;"></div><div><div></div><div><div style="text-align:left;"> If you run a small business in 2026, you are running a technology operation. Whether you intended to or not. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> It rarely begins strategically. The tech savvy owner sets up Microsoft 365. A capable employee informally manages passwords. The office manager resets the Wi Fi when needed. Backups are assumed. Security is partial. Nothing appears broken. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> Over time, however, technology shifts from convenience to infrastructure. It underpins payroll, invoicing, scheduling, client communication, vendor management, and financial reporting. It becomes embedded in revenue flow and operational continuity. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> At that point, the issue is no longer technical. It is structural. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> Most small businesses do not suffer from a lack of tools. They suffer from an informal accumulation of risk. Administrative access is concentrated in one individual. Backups are unverified. Security controls are inconsistent. Documentation is minimal. Knowledge is tribal. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> This works until it doesn't. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> When a credential is compromised, access to core systems is interrupted. When a key employee leaves, institutional knowledge leaves with them. When backups fail, recovery is uncertain. The technical event is rarely catastrophic on its own. The operational impact is. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> Email downtime becomes workflow disruption. Financial system lockouts delay revenue. Access confusion slows teams. Leadership attention shifts from growth to containment. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> In small businesses, disruption is not distributed. It concentrates at the top. Owners and senior leaders absorb the interruption personally. Strategic focus narrows. Reactive decision making increases. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> Over time, this produces a culture of normalization around instability. Small interruptions become expected. Firefighting becomes routine. Leadership energy is fragmented across preventable events. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> The cost is not primarily financial. It is strategic erosion. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> There is no longer a meaningful distinction between “IT” and “operations.” Technology now functions as operational infrastructure. It deserves the same intentional design applied to finance, compliance, and hiring. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> Operationally disciplined businesses do not eliminate technical issues. They reduce single points of failure. They clarify ownership. They verify resilience. They document access. They treat systems as assets rather than conveniences. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> You may not have set out to build an IT department. But your business now depends on one. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> The shift from informal management to structured oversight is not about becoming more technical. It is about protecting operational continuity. </div>
<div style="text-align:left;"><br></div><div style="text-align:left;"> That distinction defines whether technology remains a recurring disruption or becomes a stable foundation for growth. </div>
</div><div></div></div><div style="text-align:left;"></div></div><div style="text-align:left;"><span></span></div>
<p></p></div></div><div data-element-id="elm_EYyFok7SSfCaaKPI2WGUaA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Fri, 27 Mar 2026 14:48:51 -0700</pubDate></item><item><title><![CDATA[Why Backups Alone Are Not a Ransomware Strategy]]></title><link>https://www.newfathom.com/blogs/post/why-backups-alone-are-not-a-ransomware-strategy</link><description><![CDATA[For years, the go-to answer to ransomware has been simple: “We have backups.” While backups are a critical part of any cybersecurity program, relying ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Hoi8RnuwTRiYXpo72KKKcQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e5xJbGttTWiITuDYFknKbA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_91sid9rpT82gavQyYggfew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pjkyK43l9RBOW_UrTGE4_g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pjkyK43l9RBOW_UrTGE4_g"] .zpimage-container figure img { width: 1110px ; height: 740.00px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/Blog%20Images/Backups%20and%20Recovery%20-%20Feb%202-%202026-%2002_57_06%20PM.png" size="fit" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_TvmafSb_QRuq8x8ASb5B_g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Why Backups Alone Are Not a Ransomware Strategy</span></h2></div>
<div data-element-id="elm_ZgxHIhL6TQGPY5dJet1zqQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:justify;"> For years, the go-to answer to ransomware has been simple: “We have backups.” While backups are a critical part of any cybersecurity program, relying on them as the primary ransomware defense is a dangerous oversimplification. In today’s threat landscape, backups alone are no longer enough. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> Modern ransomware attacks are no longer smash-and-grab operations. Attackers are patient, deliberate, and strategic. Once inside a network, they often spend days or weeks performing reconnaissance—identifying critical systems, locating backup infrastructure, and escalating privileges. By the time ransomware is deployed, attackers frequently know exactly where backups live and how to disable or encrypt them first. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> From a NIST Cybersecurity Framework (CSF) perspective, this is a failure of the Protect and Detect functions. If attackers can move freely, access backup systems, and operate undetected for extended periods, the organization is already operating at a disadvantage long before encryption begins. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> Even when backups survive an attack, recovery is rarely quick or painless. Restoring large environments can take days or weeks, during which business operations may be severely disrupted. For many organizations, especially small and mid-sized businesses, extended downtime can be just as damaging as data loss itself. Missed revenue, lost customers, regulatory penalties, and reputational harm can far outweigh the cost of the ransom. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> This is where Incident Response (IR) and Disaster Recovery (DR) planning intersect. Backups support recovery, but without a defined incident response process—who makes decisions, how systems are isolated, when recovery begins—organizations often lose valuable time. In NIST terms, the Respond and Recover functions are just as critical as prevention. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> Another common misconception is that any backup is a good backup. Traditional backups that are writable, online, and accessible with standard administrative credentials are prime targets. If attackers compromise a domain admin account—and many do—those backups are often compromised right along with everything else. Without protections like immutability, offline copies, or strict access controls, backups may offer a false sense of security. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> Testing is another overlooked weakness. Many organizations assume backups will work because they always have. But backups that are never tested may be incomplete, corrupted, or unusable when they’re needed most. From a DR standpoint, an untested restore is not a plan—it’s a hope. NIST’s Recover function explicitly emphasizes the importance of validated recovery processes and continuous improvement. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> A resilient ransomware strategy focuses on survivability, not perfection. This includes layered defenses such as endpoint detection and response (EDR), least-privilege access, network segmentation, and continuous monitoring. It also requires tabletop exercises and incident response testing so teams are prepared before a real event occurs. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> Backups remain essential, but they should be treated as a last line of defense, not the first. Organizations should invest in immutable or offline backups, restrict access to backup systems, monitor for suspicious activity, and regularly test recovery procedures. Just as importantly, leadership must understand that cybersecurity resilience is a business issue—not just an IT responsibility. </div>
<div style="text-align:justify;"><br></div><div style="text-align:justify;"> In ransomware incidents, the question is no longer “Can we recover our data?” It’s “Can we continue operating?” Backups help—but only as part of a broader strategy aligned with NIST CSF, Incident Response, and Disaster Recovery best practices. </div>
</div><p></p></div></div><div data-element-id="elm_v5Tcpb75Ty6-wIxUUNu9BQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 03 Feb 2026 13:18:44 -0800</pubDate></item><item><title><![CDATA[Windows 10 End-of-Life: How to Stay Safe (and Why It’s Time to Move On)]]></title><link>https://www.newfathom.com/blogs/post/windows-10-end-of-life-how-to-stay-safe-and-why-it-s-time-to-move-on</link><description><![CDATA[Windows 10 support ends in 2025, but users can extend security updates temporarily. Still, upgrading to Windows 11 is strongly recommended for better security, features, and long-term support.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rEb-14TuQ9WwXnMiLqYJCA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OZGJIb_SQ8iW7GQ65kKyzQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pWLg7hUMRJ-SrFDQwNVNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA"] .zpimage-container figure img { width: 1110px ; height: 739.71px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/g1033ef0c302d8baad6d26a1bac745fb07755aec4c7e76f66000a1929587c76b40d29bbfe2272d47f9e4e07242c318bedbb9ab55f6170840d6c1da537f00e4ae4_1280.jpg" size="fit" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_pS7EvTLjQ1OfljjKFO08HA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Windows 10 Is Going Away</h2></div>
<div data-element-id="elm_zJhn0VTIQE2mS2xSBY-9Bg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:justify;"> Windows 10 is officially reaching its end-of-life on&nbsp;<strong>October 14, 2025</strong>, which means Microsoft will stop providing free security updates and support to most users. But if you're not ready—or able—to upgrade your system to Windows 11, you're not entirely out of luck. Microsoft is offering Extended Security Updates (ESUs) for Windows 10 users, giving them more time to transition. Here's how you can stay secure on Windows 10 a little longer—and why upgrading still makes sense. <br></div>
<div style="text-align:justify;"><br></div></div><p></p></div></div><div data-element-id="elm_aztFUy7cw6AtCq1-O6AfWQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Extended Security Updates: Your Options<br></span></h2></div>
<div data-element-id="elm_41dB5uUMk7puhcvJ2uSpSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p>Microsoft's Extended Security Updates program was originally designed for enterprise customers, but for Windows 10, it’s being made available to&nbsp;<strong>individual users</strong>&nbsp;as well.</p><p>You now have&nbsp;<strong>two main options</strong>&nbsp;if you want to stay on Windows 10 past its official support end date:</p><ul><li><p><strong>Free Updates Through Microsoft Accounts (With Strings Attached):&nbsp;</strong>Microsoft is offering&nbsp;<strong>free ESUs for some Windows 10 users</strong>, particularly those who log in with a&nbsp;<strong>Microsoft account</strong>&nbsp;and allow telemetry and cloud integration features like OneDrive, Edge, and Microsoft 365 integration. While this is a generous offer, it does come with privacy trade-offs and may not be suitable for users with more restrictive security requirements.</p></li></ul><ul><li><p><strong>Paid Updates ($30 per Year):&nbsp;</strong>For users who don’t want to enable Microsoft cloud features or who use Windows in a professional or disconnected environment, Microsoft is offering a more traditional&nbsp;<strong>paid ESU plan</strong>—starting at&nbsp;<strong>$30 per year per device</strong>. This provides peace of mind with minimal strings attached, ensuring you get critical security patches through at least&nbsp;<strong>October 2028</strong>.</p></li></ul></div>
</div><div data-element-id="elm_3-YLHscu3hx3u6XsK6quLg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Why Staying on Windows 10 Isn’t Ideal — But May Be Necessary If You’ve Delayed<br></span></h2></div>
<div data-element-id="elm_cAemEsrQEmysYjw_7hi1Lw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Let’s be clear:&nbsp;<strong>Extended Security Updates for Windows 10 aren’t a long-term solution—they’re a safety net</strong>. If you’re still running Windows 10 in 2025, it likely means you've put off upgrading longer than you should have. Whether it's due to hardware limitations, budget constraints, or just procrastination, the reality is that&nbsp;<strong>this option exists to buy you a little more time</strong>, not to encourage you to keep using an outdated OS indefinitely.</span></p><div><h3><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Here’s why some users might need to rely on ESUs:</span></p><div><span style="font-size:16px;"><div><ul><li><span style="font-family:&quot;pt serif&quot;;"><strong>You’re Stuck with Legacy Hardware:&nbsp;</strong>If your current PC doesn’t meet Windows 11’s hardware requirements—like TPM 2.0 or newer CPUs—you might not be able to upgrade without replacing your device. That’s understandable, but still something you’ll need to address soon.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Haven’t Budgeted for a Replacement:&nbsp;</strong>Organizations and individuals that didn’t plan ahead may find themselves scrambling to update systems or find room in the budget for new hardware.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Need More Time to Migrate Critical Software or Workflows:&nbsp;</strong>If you’re relying on legacy software or workflows that haven’t been tested on Windows 11, the ESU program gives you a short grace period to adapt.</span></li></ul></div>
<div><div><span style="font-family:&quot;pt serif&quot;;"><br></span></div><div><span style="font-family:&quot;pt serif&quot;;">But make no mistake: <strong>continuing to use Windows 10—even with ESUs—is a compromise. </strong>You’re relying on limited updates, missing out on new features, and holding onto a platform that Microsoft is gradually leaving behind.</span></div>
</div><div><div><span style="font-family:&quot;pt serif&quot;;">This is your final warning window. Don’t use ESUs as an excuse to stay complacent—<strong>use them to plan your transition as soon as possible.</strong></span></div>
</div></span></div></h3></div></div></div><div data-element-id="elm_HQNv2BYu6V55nk33mO11uQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>But Let’s Be Honest: Windows 11 Is the Future<br></span></h2></div>
<div data-element-id="elm__pz31VB6In-0BbaJz6XJ1A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>While ESUs buy you time,&nbsp;<strong>Windows 11</strong>&nbsp;is clearly where Microsoft is investing its resources. Here’s why making the move is ultimately the better long-term choice:</p><ul><li><p><strong>Ongoing Support and Updates:&nbsp;</strong>Windows 11 gets regular feature and security updates without added cost or complexity.</p></li><li><p><strong>Improved Security:&nbsp;</strong>Windows 11 requires modern hardware with built-in security features like TPM 2.0 and VBS (Virtualization-Based Security), which make it much more resilient to modern threats.</p></li><li><p><strong>Modern User Interface and Features:&nbsp;</strong>From better window snapping to native Android app support and AI integration with Copilot, Windows 11 is designed for productivity and future compatibility.</p></li></ul></div>
<p></p></div></div><div data-element-id="elm_4WKzdFlI2H8gQuIUCpAyPA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Final Thoughts<br></span></h2></div>
<div data-element-id="elm_S9oqkb-ah9Sr0-bRxY8fHg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><div><div><div><div><p>If you're not ready to move to Windows 11 yet, Microsoft’s Extended Security Updates for Windows 10 are a valuable option—especially with the free tier now available to personal users. But ESUs are a&nbsp;<strong>short-term solution</strong>, not a permanent fix. Use the extra time wisely: assess your hardware, back up your data, and plan your move to Windows 11. The future of Windows—and your security—depends on it.</p></div>
</div></div></div></div></div></div><div><div><div><div style="margin-bottom:12px;"><div><div><div style="margin-right:15px;"></div>
</div></div></div></div></div></div></div><p></p></div></div><div data-element-id="elm_MMR7zkmMTtuZenzYIiXJlQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 15 Jul 2025 09:52:14 -0700</pubDate></item><item><title><![CDATA[8 Things I'm Excited About in Windows 11]]></title><link>https://www.newfathom.com/blogs/post/8-things-i-m-excited-about-in-windows-11</link><description><![CDATA[Windows 11 has brought a wave of fresh updates, improved features, and exciting tools that make daily computing more efficient and enjoyable. From better multitasking to enhanced creativity tools, Microsoft has focused on making Windows 11 more user-friendly and productive.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cw-iolZ8Sz-R8zJs0rKbIg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QPCHWmTOThumdHjPe9UrvA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YQuXNkz6Qb6X9iAlp6IR-A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bn5IgDZbUX810UGMobf4Tw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_bn5IgDZbUX810UGMobf4Tw"] .zpimage-container figure img { width: 500px ; height: 292.19px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/productivity-1995786_1280.jpg" size="medium" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_VO_vpUUATlCL_D7xHWtcqA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>8 Things I'm Excited About in Windows 11<br></span></h2></div>
<div data-element-id="elm_lTfE1VpNQf6iJujrA899RQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div> Windows 11 has brought a wave of fresh updates, improved features, and exciting tools that make daily computing more efficient and enjoyable. From better multitasking to enhanced creativity tools, Microsoft has focused on making Windows 11 more user-friendly and productive. Here are eight things I’m excited about in Windows 11. </div>
</div><p></p></div></div><div data-element-id="elm_uuZZQdMvz5_RYQLqtfB6mw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>1. Snipping Tool</span></h3></div>
<div data-element-id="elm_GB0Zk3rPyKA611CTQ3-nVA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div></div>
<div><p>The Snipping Tool in Windows 11 has received a major upgrade, making it more than just a simple screenshot utility.</p><h4>Why It's Helpful</h4><p>The new Snipping Tool includes video recording functionality, eliminating the need for third-party applications for basic screen recordings. Whether you need to demonstrate a process, capture gameplay, or create a tutorial, this built-in tool makes it easy.</p><p>Additionally, users can set the Snipping Tool to activate when pressing the&nbsp;<code>Print Screen</code>&nbsp;button, making it even more convenient to take screenshots.</p><h4>Recording Options for Images</h4><p>Users can now annotate, crop, and edit screenshots directly within the Snipping Tool. The enhanced functionality saves time, as there’s no need to switch between different applications.</p><h4>How to Use</h4><ol start="1"><li><p>Press&nbsp;<code>Windows + Shift + S</code>&nbsp;to open the Snipping Tool.</p></li><li><p>Select the area of the screen you want to capture.</p></li><li><p>Edit, annotate, or save your screenshot directly.</p></li><li><p>To record video, open the Snipping Tool, switch to the recording mode, select the area to record, and start capturing.</p></li></ol></div>
<div></div></div></div></div><p></p></div></div><div data-element-id="elm_Kwcg5j0gGnq0kfWwVeqOcg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>2. Clipboard History<br></span></h3></div>
<div data-element-id="elm_jt1YUR82II7I3-uG0FaS-Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Clipboard history is a simple but powerful feature that makes copying and pasting more efficient.</p><h4>Why It's Helpful</h4><p>Instead of being limited to a single copied item, Clipboard History allows users to store multiple copied texts and images, making it easier to retrieve previously copied content.</p><h4>How to Turn On</h4><ol start="1"><li><p>Open&nbsp;<code>Settings &gt; System &gt; Clipboard</code>.</p></li><li><p>Toggle on&nbsp;<code>Clipboard History</code>.</p></li></ol><h4>How to Use</h4><ol start="1"><li><p>Press&nbsp;<code>Windows + V</code>&nbsp;to open the Clipboard History.</p></li><li><p>Select any previous item to paste it.</p></li></ol></div>
<p></p></div></div><div data-element-id="elm_WO626aFFaiECzSmT8Ztzqg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>3. Focus Timers<br></span></h3></div>
<div data-element-id="elm_B1V_2GwGZyfGMiVFGTUwqg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Windows 11 introduces Focus Timers, designed to help users concentrate by minimizing distractions.</p><h4>Why It's Helpful</h4><p>With built-in timers and Do Not Disturb mode, Focus Timers encourage productivity by silencing notifications and reducing digital interruptions.</p><h4>How to Use</h4><ol start="1"><li><p>Open the&nbsp;<code>Clock</code>&nbsp;app and navigate to&nbsp;<code>Focus Sessions</code>.</p></li><li><p>Set a timer for a work session.</p></li><li><p>Integrate with Spotify or Microsoft To-Do for an enhanced focus experience.</p></li></ol></div>
<p></p></div></div><div data-element-id="elm_dcSAKn_6I3k7-9X-k1XrZA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>4. Snap Layouts<br></span></h3></div>
<div data-element-id="elm_iigPWX6ht-mnUNXso3BdNw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Multitasking is easier with Snap Layouts, allowing users to organize open windows efficiently.</p><h4>Why It's Helpful</h4><p>Instead of manually resizing windows, Snap Layouts lets users arrange multiple apps in preset layouts with a simple hover action.</p><h4>How to Use</h4><ol start="1"><li><p>Hover over the maximize button of any window.</p></li><li><p>Choose a layout and assign windows to different sections of the screen.</p></li><li><p>Quickly switch between layouts using&nbsp;<code>Windows + Z</code>.</p></li></ol></div>
<p></p></div></div><div data-element-id="elm_dETME31bK96xvPWi4wLwag" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>5. Virtual Desktops<br></span></h3></div>
<div data-element-id="elm_ddZ12Y4Dtmq-fZm6D22pEw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Virtual Desktops in Windows 11 provide a way to separate workspaces for better organization.</p><h4>Why It's Helpful</h4><p>Users can create separate desktops for work, personal tasks, and entertainment, reducing clutter and improving focus.</p><h4>How to Use</h4><ol start="1"><li><p>Press&nbsp;<code>Windows + Tab</code>&nbsp;to open Task View.</p></li><li><p>Click&nbsp;<code>New Desktop</code>&nbsp;to create a separate workspace.</p></li><li><p>Switch between desktops using&nbsp;<code>Windows + Ctrl + Left/Right Arrow</code>.</p></li></ol><h4>New Desktops</h4><p>Windows 11 enhances Virtual Desktops with customization options.</p><h5>Naming Desktops</h5><p>Users can name their desktops to distinguish between different workspaces, making it easier to navigate.</p><h5>Shortcuts</h5><p>Use&nbsp;<code>Windows + Ctrl + D</code>&nbsp;to create a new desktop quickly.</p></div>
<p></p></div></div><div data-element-id="elm_gGPl3Rei7AolmrUny1JnvA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>6. Sound Recorder<br></span></h3></div>
<div data-element-id="elm_pAiwRQUtn1PkQ2f7irF7hg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Windows 11 revamps the classic Sound Recorder, making it a more useful tool for recording and managing audio.</p><h4>Why It's Helpful</h4><p>The new Sound Recorder offers a modern interface with waveform visualization, improved playback controls, and enhanced audio quality settings. It’s a great tool for recording lectures, meetings, voice notes, and more.</p><h4>How to Use</h4><ol start="1"><li><p>Open Sound Recorder from the Start Menu.</p></li><li><p>Click the record button to start capturing audio.</p></li><li><p>Stop the recording and save the file in various formats.</p></li><li><p>Use playback controls to review or edit the recording.</p></li></ol></div>
<p></p></div></div><div data-element-id="elm_DqQHGTKrckDxIHapReaqYA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>7. Visualize Battery Usage<br></span></h3></div>
<div data-element-id="elm_tMfsGz0FvsWj5ZnM2L3bdA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Windows 11 allows users to see detailed battery usage statistics.</p><h4>Why It's Helpful</h4><p>Understanding which apps drain battery life helps in optimizing device performance and extending battery longevity.</p><h4>How to See Usage</h4><ol start="1"><li><p>Open&nbsp;<code>Settings &gt; System &gt; Power &amp; Battery</code>.</p></li><li><p>View a breakdown of battery usage by apps and system activity.</p></li></ol></div>
<p></p></div></div><div data-element-id="elm_jX2raArLMdcSvQuCaTzQhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>8. ClipChamp Free<br></span></h3></div>
<div data-element-id="elm_T8RXcMrCMabtdU5EfwmFMw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>ClipChamp is Microsoft’s new built-in video editor, replacing Windows Movie Maker.</p><h4>Why It's Helpful</h4><p>ClipChamp provides a free, intuitive video editing experience with professional features like trimming, transitions, and text overlays.</p><h4>Reminiscent of Windows Movie Maker</h4><p>For those who miss Windows Movie Maker, ClipChamp brings back simple yet effective video editing tools in a modern interface.</p><h4>How to Use</h4><ol start="1"><li><p>Open ClipChamp from the Start Menu.</p></li><li><p>Import media and use drag-and-drop editing.</p></li><li><p>Export the final video in different formats and resolutions.</p></li></ol></div>
<p></p></div></div><div data-element-id="elm_XVkSCKTDnx78y7aVfKienA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true">Conclusion</h3></div>
<div data-element-id="elm_KuJNErd38-AbwwKsOz-Srw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><div><div><div><div><p>Windows 11 is packed with features that enhance productivity, creativity, and usability. From improved multitasking tools like Snap Layouts to creative tools like ClipChamp, these updates make the operating system more efficient and user-friendly. With these eight features, Windows 11 is shaping up to be the best version of Windows yet.</p></div>
</div></div></div></div></div></div><div><div><div><div><div><div><div></div></div>
</div></div></div></div></div></div><p></p></div></div><div data-element-id="elm_ZdgSNtG0Sm-e-56gvWx4Mw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 31 Mar 2025 15:53:37 -0700</pubDate></item><item><title><![CDATA[Navigating the Future of Cybersecurity: Key Trends for 2025]]></title><link>https://www.newfathom.com/blogs/post/navigating-the-future-of-cybersecurity-key-trends-for-2025</link><description><![CDATA[As we step into 2025, the cybersecurity landscape is evolving at an unprecedented pace. The latest insights from the Google Cloud Cybersecurity Foreca ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ezfQeeF-QU6qKZTC55CXkg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gqvPAOqgReqGmW8qKT7RTg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tjrJ-Kv0QpSQjvkCEtnIlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dAY2l5wuRPcBL5fOdmlxxg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dAY2l5wuRPcBL5fOdmlxxg"] .zpimage-container figure img { width: 500px !important ; height: 334px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/pexels-photo-1203808.jpeg" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_zQuG9W1dRkq0YZ9nPQ0rcg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;"><span style="color:inherit;">As we step into 2025, the cybersecurity landscape is evolving at an unprecedented pace. The latest insights from the Google Cloud Cybersecurity Forecast 2025 highlight the challenges and opportunities that organizations face in combating cyber threats. This blog synthesizes the report’s key findings to equip businesses and security teams with the knowledge needed to stay ahead.</span></p><h3 style="text-align:left;">The Role of Artificial Intelligence (AI) in Cybersecurity</h3><p style="text-align:left;"><strong>AI as a Double-Edged Sword:</strong> Malicious actors are increasingly leveraging AI and large language models (LLMs) to enhance their operations. These technologies enable the creation of convincing phishing campaigns, deepfake-based fraud, and sophisticated vulnerability research. Simultaneously, defenders are adopting AI to streamline threat detection and automate repetitive tasks, paving the way for semi-autonomous security operations.</p><p style="text-align:left;"><strong>Generative AI in Information Operations:</strong> Adversaries are utilizing generative AI tools to produce persuasive content and backstop inauthentic personas. This surge in AI-driven information operations underscores the need for enterprises to bolster their defenses against social engineering and misinformation campaigns.</p><h3 style="text-align:left;">Geopolitical Cyber Threats: The Big Four</h3><p style="text-align:left;"><strong>Russia:</strong> The Ukraine conflict continues to dominate Russian cyber activity, with espionage and disruptive attacks targeting critical infrastructure. Pro-Russian information operations aim to influence global perceptions, particularly in Europe and NATO-aligned nations.</p><p style="text-align:left;"><strong>China:</strong> China’s cyber operations are marked by stealth and aggression. Their tactics include exploiting zero-day vulnerabilities and employing custom malware ecosystems to infiltrate embedded systems. Pro-Chinese information campaigns target elections and global audiences with disinformation.</p><p style="text-align:left;"><strong>Iran:</strong> Iran’s cyber activities focus on regional influence and monitoring dissidents. The Israel-Hamas conflict has intensified their operations, blending cyber espionage with disruptive attacks.</p><p style="text-align:left;"><strong>North Korea:</strong> Driven by economic necessity and geopolitical goals, North Korea continues to target cryptocurrency exchanges and supply chains. Their use of trojanized software to infiltrate networks underscores the need for enhanced supply chain security.</p><h3 style="text-align:left;">Emerging Threats and Trends</h3><p style="text-align:left;"><strong>Ransomware and Multifaceted Extortion:</strong> Despite efforts to counter ransomware, it remains a pervasive threat. Attackers are employing multifaceted extortion tactics, including data theft and service disruption, with healthcare and critical infrastructure often in the crosshairs.</p><p style="text-align:left;"><strong>Infostealer Malware:</strong> The rise of infostealer malware presents a gateway to high-impact breaches. These tools enable attackers to harvest credentials, bypassing security measures in environments lacking multifactor authentication.</p><p style="text-align:left;"><strong>Faster Exploitation of Vulnerabilities:</strong> The average time-to-exploit (TTE) for disclosed vulnerabilities has dropped dramatically. Organizations must adopt proactive vulnerability management strategies to mitigate risks posed by this rapid exploitation.</p><p style="text-align:left;"><strong>Post-Quantum Cryptography:</strong> With the finalization of quantum-safe encryption standards, organizations must prepare for the post-quantum era. Inventorying cryptographic systems and transitioning to quantum-resistant solutions will be critical in safeguarding sensitive data.</p><h3 style="text-align:left;">Regional Insights</h3><p style="text-align:left;"><strong>EMEA:</strong> The updated Network and Information Security Directive (NIS2) is reshaping cybersecurity practices across Europe, emphasizing risk management, supply chain security, and regulatory compliance. Geopolitical conflicts continue to drive threat activity in the region, underscoring the importance of cloud security.</p><p style="text-align:left;"><strong>JAPAC:</strong> North Korean actors are targeting cryptocurrency investments in JAPAC, while Southeast Asian cyber criminals innovate with AI and deepfake technologies. Additionally, Chinese-controlled websites posing as local news outlets are disseminating pro-Beijing content.</p><h3 style="text-align:left;">Preparing for 2025: Key Takeaways</h3><ol start="1"><li><p style="text-align:left;"><strong>Leverage AI Responsibly:</strong> Integrate AI tools to enhance security operations while safeguarding against AI-driven threats.</p></li><li><p style="text-align:left;"><strong>Strengthen Identity Management:</strong> Implement phishing-resistant multifactor authentication and robust access controls to mitigate identity-based risks.</p></li><li><p style="text-align:left;"><strong>Adopt Cloud-Native Security Solutions:</strong> Enhance monitoring, automate incident response, and address cloud-specific vulnerabilities.</p></li><li><p style="text-align:left;"><strong>Stay Ahead of Quantum Threats:</strong> Begin transitioning to quantum-safe cryptographic standards and inventorying cryptographic dependencies.</p></li><li><p style="text-align:left;"><strong>Invest in Threat Intelligence:</strong> Proactively monitor geopolitical and technological trends to anticipate and counter emerging threats.</p></li></ol><p style="text-align:left;">The cybersecurity challenges of 2025 demand a proactive and adaptive approach. By understanding these evolving trends, organizations can build resilience and ensure a secure future in an increasingly complex digital world.</p></div>
</div></div><div data-element-id="elm_JzUBctLfTdehaUhMMyaLjg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Thu, 02 Jan 2025 08:15:39 -0800</pubDate></item><item><title><![CDATA[Top Cyber Security Policies Every Organization Should Have]]></title><link>https://www.newfathom.com/blogs/post/top-cyber-security-policies-every-organization-should-have</link><description><![CDATA[In today's digital age, cybersecurity is not just a technical issue to be solved by the IT department, but a business imperative that must be solved a ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_avHthubnRSi7SPFihQ5gbA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1pQVCS6qQ7CUufYjJi3Xng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_R9f1dOPUTseyKQeNNUXbpA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1AO7wKkqPOwhFzIMn_Qegg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_1AO7wKkqPOwhFzIMn_Qegg"] .zpimage-container figure img { width: 500px ; height: 630.21px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/pexels-photo-7731397.jpeg" size="medium" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_FPo-a8FVTDWhoaXGIb6ksA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Top Cyber Security Policies Every Organization Should Have</span></h2></div>
<div data-element-id="elm_75cJBEgUSmGU4GVv1FvHYA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;">In today's digital age, cybersecurity is not just a technical issue to be solved by the IT department, but a business imperative that must be solved and enforced at the top. Deploying and enforcing essential IT policies will help ensure your organization is ready for the real challenges likely to face an organization. Effective cybersecurity policies serve as the foundation for a secure working environment, ensuring that all employees understand their roles and responsibilities in safeguarding the organization. Below are the top cybersecurity policies every organization should have, along with explanations of their importance.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_997ZX84lfenhR5R6GpFtrA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Acceptable Use Policy (AUP)&nbsp;</span></h3></div>
<div data-element-id="elm_nSdGwHek78Jn7NjSxH390A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_E7SCQ7JB70ZU2nRE63FBNQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">An Acceptable Use Policy (AUP) sets clear guidelines for employees on the appropriate use of the organization's IT resources, including computers, networks, and internet access. It helps prevent misuse that could lead to security vulnerabilities or legal issues.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_F08fWTPc8eCZ-4OgAY2Q0w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_I7lxADQUz0Af9Zz8SF1k2g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Permitted and Prohibited Activities:</span> The policy should clearly define what constitutes acceptable and unacceptable use of the organization's IT resources. This includes prohibiting activities such as downloading unauthorized software, accessing inappropriate websites, or using company devices for personal gain.&nbsp;</li><li><span style="font-weight:bold;">Monitoring and Enforcement:</span> Employees should be aware that their use of IT resources may be monitored to ensure compliance with the AUP, and violations can result in disciplinary action.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Security Protocols:</span> The AUP should reinforce the importance of adhering to security protocols, such as not disabling antivirus software or bypassing firewalls.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">BYOD (Bring Your Own Device) Guidelines:</span> If the organization allows employees to use their personal devices for work, the AUP should include specific guidelines on securing these devices and accessing corporate data.&nbsp;</span></li></ul></div>
<div><br></div><div> An Acceptable Use Policy helps create a secure and responsible IT environment by defining what is and isn’t allowed, reducing the risk of security breaches and legal liabilities.&nbsp; </div>
</div></div></div><div data-element-id="elm_rutN8WqG4g2k8_A8pYc1yg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Asset Management Policy&nbsp;</span></h3></div>
<div data-element-id="elm_DSJcE2hBCKwNvqX81JsiZA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It’s Important:</span></h4></div>
<div data-element-id="elm_R5rPR-rXzN4g-sE3wjf9ZQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">An Asset Management Policy helps organizations track and manage their IT assets, including hardware, software, and data. Proper asset management ensures that all assets are accounted for, protected, and maintained, reducing the risk of security vulnerabilities and ensuring compliance with regulations.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_iw6-csCjXWSaUQAbEuGrkA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_8fXAlcTM9NS9qecf165ABw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Asset Inventory: </span>The policy should require the creation and maintenance of an up-to-date inventory of all IT assets, including servers, computers, mobile devices, software licenses, and data repositories.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Ownership and Responsibility:</span> Each asset should have an assigned owner responsible for its security, maintenance, and compliance with organizational policies.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Asset Classification: </span>Assets should be classified according to their criticality and sensitivity, with corresponding security measures applied based on their classification.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Lifecycle Management: </span>The policy should cover the entire lifecycle of an asset, from acquisition and deployment to maintenance and disposal. Secure disposal practices, such as data wiping or physical destruction, should be mandated for retiring assets.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Remote Monitoring and Management (RMM):</span> RMM tools should be deployed to monitor the health, performance, and security of all IT assets continuously. These tools enable proactive maintenance, reducing the risk of asset failures and security incidents.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Endpoint Detection and Response (EDR): </span>EDR solutions should be implemented on all endpoints to detect, investigate, and respond to potential threats in real-time. This is crucial for preventing and mitigating cyber threats at the device level.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Patch Management: </span>The policy should mandate regular patching of all software and firmware to address vulnerabilities. Automated patch management solutions should be used to ensure that updates are applied promptly across all assets, reducing the risk of exploitation.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Access Controls: </span>Implement appropriate access controls to ensure that only authorized personnel have access to specific assets, reducing the risk of unauthorized access or misuse.&nbsp;</span></li></ul></div>
</div></div></div><div data-element-id="elm_h8TiFQLSRPxSoxXOfnah2w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Business Continuity Plan (BCP)&nbsp;</span></h2></div>
<div data-element-id="elm_60kYCuTuQbMNh5z-MQUvRg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_z66CH_ndSN_D8SVgYRMEng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">No matter how robust an organization's cybersecurity defenses are, the possibility of a successful cyberattack or catastrophic event cannot be completely eliminated. A Disaster Recovery Plan (DRP) or Business Continuity Plan (BCP) ensures that the organization can quickly recover and resume operations in the event of a disaster, whether it's a cyberattack, natural disaster, or other significant disruption.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_YC7A6xmJJ2X2K7wVVufAhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_K-pJnDaGmHNuK-O8LGFAbA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Risk Assessment:</span> The plan should begin with an assessment of the risks that could potentially disrupt the organization, including cyber threats, natural disasters, and hardware failures.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Data Backup Procedures:</span> Regular backups of critical data should be maintained and stored securely, preferably offsite or in the cloud, to ensure data can be restored if lost.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs):</span> The plan should define the maximum acceptable downtime (RTO) and the maximum amount of data loss (RPO) the organization can tolerate.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Roles and Responsibilities: </span>Clear roles and responsibilities should be assigned to ensure that the recovery process is efficient and coordinated.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Testing and Updates:</span> The plan should be regularly tested and updated to ensure its effectiveness in a real-world scenario.&nbsp;</span></li></ul></div>
<div><span style="color:inherit;">A well-developed DRP or BCP minimizes downtime and data loss, ensuring that the organization can quickly recover from unexpected events and maintain business continuity.&nbsp;</span><br></div>
</div></div></div><div data-element-id="elm_esobnbA2YH3OgxfwjK7OlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p>You can edit text on your website by double clicking on a text box on your website. Alternatively, when you select a text box a settings menu will appear. your website by double clicking on a text box on your website. Alternatively, when you select a text box</p></div>
</div><div data-element-id="elm_SOBtYUFYqX_0n-ACWmwJCQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">4. Data Retention Policy&nbsp;</span></h2></div>
<div data-element-id="elm_5f4JEwPhPmwecIlpw1gGWw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:&nbsp;</span></h4></div>
<div data-element-id="elm_B2upPZV1ZAsjQT_vbE76Mw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A Data Retention Policy outlines how long different types of data should be kept and when they should be securely deleted. This policy is crucial for ensuring compliance with legal requirements, reducing storage costs, and minimizing the risk of data breaches involving outdated or unnecessary data.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_x_gIdczbJpZcEC-dpi5xtQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_xT0ovISiXtZRMqSaXBRzCA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Classification of Data:</span> Different types of data should be classified according to their importance and sensitivity. For example, financial records may need to be kept longer than marketing data.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Retention Periods: </span>The policy should specify retention periods for each type of data, based on legal, regulatory, and business requirements.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Secure Deletion:</span> When data is no longer needed, it should be securely deleted to prevent unauthorized access. This may involve overwriting data or physically destroying storage media.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Compliance Considerations:</span> The policy should ensure that data retention practices comply with relevant laws and regulations, such as GDPR or HIPAA.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Regular Review:</span> The policy should be regularly reviewed and updated to reflect changes in legal requirements, technology, and business needs.&nbsp;</span></li></ul><div><br></div>
</div><div><span style="color:inherit;">A Data Retention Policy helps organizations manage their data effectively, ensuring that they retain only what is necessary while reducing the risk of data breaches and non-compliance penalties.&nbsp;</span><br></div>
</div></div></div><div data-element-id="elm_1I4mICseX4yMKVKg0AbgGQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Password Construction Policy</span></h2></div>
<div data-element-id="elm_cUXFh1qVtKGCuohtV7iPFg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_asKMIs-VKNxYD4PQ618dfw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Passwords are the first line of defense against unauthorized access to an organization's systems and data. A weak password can be easily guessed or cracked by cybercriminals, granting them access to sensitive information. A Password Construction Policy ensures that all employees create strong, complex passwords that are difficult to break.</span><br></p></div>
</div><div data-element-id="elm_FRaAtLpIugHe50k371CnFg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_JRPLEuByMryPVqtuzYY2cw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Length Requirements: </span>The policy should mandate the use long passwords. Longer is better and more important for password cracking than complexity! NIST does not recommend complexity be a requirement but recommends length as a key factor of a good password. Consider a length of 16 or more characters where possible.</li><li><span style="font-weight:bold;">Prohibition of Common Passwords:</span> To avoid the use of easily guessable passwords, the policy should disallow commonly used passwords like "password123 Length " or "admin."</li><li><span style="font-weight:bold;">Unique Passwords:</span> Employees should not reuse passwords across different accounts or systems to minimize the potential impact of a single password breach. To do this effectively you probably need to deploy a password manager, but the reason for that is uniqueness.&nbsp;</li></ul></div>
<div><span style="color:inherit;">A strong Password Construction Policy ensures that all employees create robust passwords, significantly reducing the risk of unauthorized access.</span></div>
</div></div></div></div><div data-element-id="elm_rJUq2JazI-1VlTF1xwpS0g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">6. Password Protection Policy</span></h2></div>
<div data-element-id="elm_znKqlRLf17smJ_R8_HIQyw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_YIQ4d19goHT5RTTvdhgg4A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Even the strongest password is vulnerable if it is not properly protected. A Password Protection Policy outlines how employees should handle and store their passwords to prevent unauthorized access.</span><br></p></div>
</div><div data-element-id="elm_n4T3lsevXv3DimWldyKuAA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_uwEZCUptO1798_EsnhhJNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Secure Storage: </span>Employees should store passwords using a secure method, such as a password manager, rather than writing them down or saving them in an unencrypted file.</li><li><span style="font-weight:bold;">Avoiding Sharing:</span> The policy should strictly prohibit the sharing of passwords with colleagues or third parties. Each employee should have their own unique credentials.</li><li><span style="font-weight:bold;">Multi-Factor Authentication (MFA):</span> Implementing MFA adds an additional layer of security by requiring users to provide two or more verification factors, reducing the likelihood of a breach even if a password is compromised.</li><li><span style="font-weight:bold;">Suspicious Activity Reporting:</span> Employees should be trained to recognize and report any suspicious activity related to their accounts, such as unexpected login attempts or changes in settings.</li></ul></div>
<div> A Password Protection Policy ensures that passwords, the keys to accessing critical systems and data, are safeguarded against compromise. </div>
</div></div></div><div data-element-id="elm_11vvGafZSV6FAcdeXnB4sA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Conclusion</h2></div>
<div data-element-id="elm_9R1WNL_aTl9eH9496zLfJg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In the face of ever-evolving cyber threats, having comprehensive cybersecurity policies is essential for protecting an organization's assets, data, and reputation. A Password Construction Policy and Password Protection Policy work hand in hand to ensure that passwords are both strong and securely managed. An Asset Management Policy ensures that all IT assets are properly tracked, managed, and secured throughout their lifecycle. A Disaster Recovery Plan or Business Continuity Plan prepares the organization for the worst-case scenario, ensuring a swift recovery. An Acceptable Use Policy establishes clear guidelines for the responsible use of IT resources, while a Data Retention Policy ensures that data is managed and disposed of securely and in compliance with legal requirements. By implementing these top cybersecurity policies, organizations can build a strong defense against cyber threats and create a secure environment for their operations.</span><br></p></div>
</div><div data-element-id="elm_jtLVi5Y_S72oNUp5rZyQdA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Fri, 04 Oct 2024 16:23:07 -0700</pubDate></item><item><title><![CDATA[Modern Data Security: Beyond Castle Walls]]></title><link>https://www.newfathom.com/blogs/post/Modern-Data-Security-Beyond-Castle-Walls</link><description><![CDATA[ In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieva ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_45HarH1VR26wAHHuQkcFfw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sc2OKxneRN65NLgl_dFgWw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jBEiumojvZSo2lVaFDSGPw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width: 500px ; height: 544.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } @media (max-width: 767px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/photo-1634565055864-06ac02738f15" width="500" height="544.00" loading="lazy" size="medium" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieval times, has been a longstanding one. Traditionally, building a strong boundary around one's castle, akin to erecting firewalls and encryption protocols around data, was deemed the pinnacle of protection. However, as technology progresses and threats become more sophisticated, this old-school method of defense is proving insufficient in the face of modern cyber threats. In this blog, we delve into the shortcomings of the castle-and-moat approach and explore how modern data security strategies have evolved to address these challenges.</p></div>
</div></div></div><div data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width: 200px ; height: 157.20px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } @media (max-width: 767px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/photo-1552775838-b0c8d3b881fb" data-src="/images/photo-1552775838-b0c8d3b881fb" width="200" height="157.20" loading="lazy" size="small" data-lightbox="true"></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Perimeter-based Security: A False Sense of Safety</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">The castle-and-moat strategy relies heavily on perimeter-based security measures. Just as a medieval castle was fortified with thick walls and a surrounding moat to repel invaders, organizations would deploy firewalls and intrusion detection systems to guard their network perimeters. However, this approach operates under the assumption that threats will always come from outside the fortified boundary. In today's interconnected world, where employees access sensitive data remotely and cloud services blur the lines of traditional network perimeters, this assumption no longer holds true.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3BLYgPttiborGTbAUnyOzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3BLYgPttiborGTbAUnyOzw"].zpelem-heading { border-radius:1px; } </style><h3 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3 style="font-size:24px;"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Vulnerabilities Within: The Trojan Horse of Data Breaches</strong></span><br></h3></div></h3></div>
<div data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">One of the fundamental flaws of the castle-and-moat model is its failure to address insider threats. While medieval fortresses were designed to withstand external assaults, they were often infiltrated by spies or traitors who bypassed the defenses from within. Similarly, in the realm of data security, the greatest threats often come from within an organization. Whether through malicious insiders or unwitting employees falling victim to social engineering tactics, the castle walls do little to protect against these internal vulnerabilities.</p></div>
</div></div></div><div data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Dynamic Threat Landscape: Adapting to the Changing Tides</strong></span><br></h2></div>
<div data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the digital age, cyber threats are constantly evolving, rendering static defenses ineffective. A medieval castle may have stood firm against conventional siege tactics, but it would have been defenseless against modern weaponry. Likewise, relying solely on static security measures such as firewalls and antivirus software leaves organizations vulnerable to sophisticated cyberattacks like zero-day exploits and advanced persistent threats. To combat these dynamic threats, modern data security strategies emphasize continuous monitoring, threat intelligence, and adaptive defenses that can quickly respond to emerging threats.</p></div>
</div></div></div><div data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Data Accessibility vs. Fortified Isolation: Balancing Security and Usability</strong></span><br></h2></div>
<div data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">Another drawback of the castle-and-moat approach is its inherent trade-off between security and usability. Just as a medieval castle's thick walls and narrow drawbridges restricted movement in and out of the fortress, strict security measures can hinder productivity and collaboration within an organization because you need to be physically inside. In today's fast-paced business environment, where agility and accessibility are paramount, rigid security protocols can impede innovation and inhibit digital transformation efforts. Modern data security aims to strike a balance between protecting sensitive information and enabling seamless access for authorized users.</p></div>
</div></div></div><div data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width: 500px ; height: 281.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } @media (max-width: 767px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" data-src="/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" width="500" height="281.19" loading="lazy" size="medium" data-lightbox="true"></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>The Perils of Compliance: Meeting Regulatory Standards vs. True Security</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">For many organizations, compliance with regulatory standards such as GDPR, HIPAA, and PCI DSS is a top priority. However, the castle-and-moat approach often leads to a checkbox mentality, where organizations focus on meeting minimum compliance requirements without truly addressing underlying security risks. Just as a castle's defenses could be breached despite meeting regulatory standards, compliance alone does not guarantee protection against sophisticated cyber threats. Modern data security strategies emphasize a risk-based approach, focusing on identifying and mitigating actual security vulnerabilities rather than simply checking boxes on a compliance checklist.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Embracing a Zero Trust Mindset: Redefining Security for the Digital Age</strong></span><br></h2></div>
<div data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In response to the limitations of the castle-and-moat model, a paradigm shift is underway in the field of data security. Known as Zero Trust Security, this approach challenges the notion of implicit trust within traditional network perimeters and adopts a "never trust, always verify" mindset. Zero Trust Security assumes that threats may already exist within the network and requires continuous authentication and authorization for every user and device attempting to access resources. By removing the assumption of trust and implementing granular access controls, organizations can better protect their data assets in today's dynamic threat landscape. This doesn’t have to be overly burdensome as companies have created easy biometric authentication and passwordless sign in. These strategies can also protect information at the data level wherever that data goes, whether at a coffee shop in Italy or a ski resort in Bend, whether on a sophisticated server or on a mobile phone in your pocket.&nbsp;</p></div>
</div></div></div><div data-element-id="elm_8EBeo4coCD380KmdUrloaQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8EBeo4coCD380KmdUrloaQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><strong><span style="font-size:20px;font-family:Lato, sans-serif;">Conclusion: Building Stronger Defenses for a Digital Future</span></strong></p></div></h2></div>
<div data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">While the castle-and-moat analogy served as a useful metaphor for data security in the past, it is no longer sufficient to protect against modern cyber threats. As technology evolves and the threat landscape continues to expand, organizations must adapt their security strategies accordingly. By embracing a holistic approach that goes beyond perimeter-based defenses, prioritizes insider threat detection, adapts to dynamic threats, balances security with usability, moves beyond compliance, and embraces a Zero Trust mindset, organizations can build stronger defenses for a digital future. Just as medieval fortresses evolved in response to changing warfare tactics, so too must our approach to data security evolve to meet the challenges of the 21st century.</p></div>
</div></div></div><div data-element-id="elm__evwMs0NQbGC4aIFrm9GWg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Thu, 09 May 2024 16:52:11 -0700</pubDate></item><item><title><![CDATA[The Cost of a Cheap (Slow) Computer]]></title><link>https://www.newfathom.com/blogs/post/the-cost-of-a-cheap-slow-computer</link><description><![CDATA[Is it worth it to buy a better computer? It's time that business owners start thinking about the costs per hour of their employees and the cost of slo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_anqdCmJ1QAKXxzQopdwqZA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TqUekVlJSm6G5Yh8Yh-u1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_k9-1zEQDQbi114udcFTh-A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"] .zpimage-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"] .zpimage-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"] .zpimage-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.newfathom.com/images/wasting-money.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_R04eBF6FQTOmXry91jginA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_R04eBF6FQTOmXry91jginA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="margin-bottom:15px;font-size:28px;">The Cost of a Cheap (Slow) Computer</h1></div></h2></div>
<div data-element-id="elm_6iXwLqWuRXCJJKusIerkXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6iXwLqWuRXCJJKusIerkXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">Is it worth it to buy a better computer? It's time that business owners start thinking about the costs per hour of their employees and the cost of slow computers in their workplace. Many business owners don't realize the financial impacts they're creating simply by buying cheap tools (computers) for their workers. Most of them wouldn't dream of sending a wood cutter with a dull chainsaw blade, but they equip their entire team with crappy computers they are stuck using every day!&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">For the below example, I'm going to assume we're buying workstations for a business for workers who use it for their main job function and they work 50 weeks per year. If that's not the case, you may still be able to learn something but you'll need to adapt the math to your situation. We're also assuming that computer will last 3-5 years, but the older they get the more likely they are to be slow and the slower they will become. Also, the cheaper computers will likely have a smaller lifespan.&nbsp;</p></div>
</div><div data-element-id="elm_BzaZwIk0qNWgc3aXsGPOBw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BzaZwIk0qNWgc3aXsGPOBw"].zpelem-heading { border-radius:1px; } </style><h4 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What Does It Cost If It's Slow?</h4></div>
<div data-element-id="elm_QIakIi_TfCle6jvdrb_yiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_QIakIi_TfCle6jvdrb_yiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Having a slow computer has a two main cost centers: time and frustration. If you're using a computer that's constantly slow to open tabs or programs then not only do you lost valuable time from your day, but it's also a frustrating experience especially the busier you get.&nbsp;</p></div>
</div><div data-element-id="elm_lcrCbv7C6L-vzmG1hElTzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_lcrCbv7C6L-vzmG1hElTzw"].zpelem-heading { border-radius:1px; } </style><h6 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Financial Cost</h6></div>
<div data-element-id="elm_zS4F7uZo3WRBvo06MTtdHw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zS4F7uZo3WRBvo06MTtdHw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Let's say you decide to buy a cheaper computer and save $500 because you buy an I3 instead of an I5 and 8GB of RAM instead of 16GB and you get an HDD instead of a solid state drive (SSD). All of those upgrades could easily cost you a three minutes of slowness throughout the day. If this computer is for an employee that costs you $25/hour then you are wasting $1.25 per day ((3/60) x $25), that may not seem like a lot, but every year that will cost $312 and over the lifetime of the computer (5 years) you'll pay $1,562 for 3 minutes every day. That's the best case scenario.&nbsp;</p><p><br></p><p>Let's say in a few years the computer is running REALLY slow and takes 30 minutes out of every day because of the lag in opening programs or slow restart times. That will cost you $12.50 per day and $3,125 every year you run a slow computer like that.&nbsp;</p></div>
</div></div><div data-element-id="elm_8SZDrJG_CovyRpxt63vlcA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8SZDrJG_CovyRpxt63vlcA"].zpelem-heading { border-radius:1px; } </style><h6 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Morale Cost</h6></div>
<div data-element-id="elm_62SV83c5-K0G_l0JZvctGQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_62SV83c5-K0G_l0JZvctGQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>But there's more than just the financial cost. When you have employees working for you and you don't provide good tools to do their work that is a big hit to morale and will likely lead to higher turnover and less employee satisfaction. The cost of hiring and training a single employee is easily thousands and thousands of dollars. But let's say they don't quite and just spend their days complaining. Even that will have a negative impact on the business and every person that employee interacts with (I hope they're not doing customer service).&nbsp;</p></div>
</div><div data-element-id="elm_ugdOt8ZEthVPBrtrkgvm0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ugdOt8ZEthVPBrtrkgvm0Q"].zpelem-heading { border-radius:1px; } </style><h6 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">A Nerdy Table</h6></div>
<div data-element-id="elm_v4Y4q7FDyh735cOgZsd8AQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_v4Y4q7FDyh735cOgZsd8AQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Below is a table calculating the costs per minute of slowness in your employees day. Of course, this assumes that this is time that could have been used on productive work, but it really doesn't take long to have slow computers costing you a lot of money!</p></div>
</div><div data-element-id="elm_Xp0_14HDDkqRT4ONofmjMA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Xp0_14HDDkqRT4ONofmjMA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="font-size:20px;"></span><table border="0" cellpadding="0" cellspacing="0" width="335"><colgroup><col width="35" span="2" style="width:26pt;"><col width="51" style="width:38pt;"><col width="69" span="2" style="width:52pt;"><col width="76" style="width:57pt;"></colgroup><tbody><tr height="147"><td align="right" style="width:26pt;"><span style="font-weight:400;font-size:20px;">Slowness Minutes Per Day</span></td><td align="right" class="zp-selected-cell"><span style="font-weight:400;font-size:20px;">Hourly Rate</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/Day</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/Year (50 Weeks of Work)</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/3 Years</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/5 Years</span></td></tr><tr height="20"><td align="right" style="font-size:11pt;">1</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$0.42</td><td align="right" style="font-size:11pt;">$104.17</td><td align="right" style="font-size:11pt;">$312.50</td><td align="right" style="font-size:11pt;">$520.83</td></tr><tr height="20"><td align="right" style="font-size:11pt;">2</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$0.83</td><td align="right" style="font-size:11pt;">$208.33</td><td align="right" style="font-size:11pt;">$625.00</td><td align="right" style="font-size:11pt;">$1,041.67</td></tr><tr height="20"><td align="right" style="font-size:11pt;">3</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$1.25</td><td align="right" style="font-size:11pt;">$312.50</td><td align="right" style="font-size:11pt;">$937.50</td><td align="right" style="font-size:11pt;">$1,562.50</td></tr><tr height="20"><td align="right" style="font-size:11pt;">4</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$1.67</td><td align="right" style="font-size:11pt;">$416.67</td><td align="right" style="font-size:11pt;">$1,250.00</td><td align="right" style="font-size:11pt;">$2,083.33</td></tr><tr height="20"><td align="right" style="font-size:11pt;">5</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$2.08</td><td align="right" style="font-size:11pt;">$520.83</td><td align="right" style="font-size:11pt;">$1,562.50</td><td align="right" style="font-size:11pt;">$2,604.17</td></tr><tr height="20"><td align="right" style="font-size:11pt;">10</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$4.17</td><td align="right" style="font-size:11pt;">$1,041.67</td><td align="right" style="font-size:11pt;">$3,125.00</td><td align="right" style="font-size:11pt;">$5,208.33</td></tr><tr height="20"><td align="right" style="font-size:11pt;">15</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$6.25</td><td align="right" style="font-size:11pt;">$1,562.50</td><td align="right" style="font-size:11pt;">$4,687.50</td><td align="right" style="font-size:11pt;">$7,812.50</td></tr><tr height="20"><td align="right" style="font-size:11pt;">20</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$8.33</td><td align="right" style="font-size:11pt;">$2,083.33</td><td align="right" style="font-size:11pt;">$6,250.00</td><td align="right" style="font-size:11pt;">$10,416.67</td></tr><tr height="20"><td align="right" style="font-size:11pt;">25</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$10.42</td><td align="right" style="font-size:11pt;">$2,604.17</td><td align="right" style="font-size:11pt;">$7,812.50</td><td align="right" style="font-size:11pt;">$13,020.83</td></tr><tr height="20"><td align="right" style="font-size:11pt;">30</td><td align="right" style="font-size:11pt;">$25</td><td align="right" style="font-size:11pt;">$12.50</td><td align="right" style="font-size:11pt;">$3,125.00</td><td align="right" style="font-size:11pt;">$9,375.00</td><td align="right" style="font-size:11pt;">$15,625.00&nbsp; &nbsp;</td></tr></tbody></table></div>
</div></div><div data-element-id="elm_-28HNss2v7Rau1zdQhvbtg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-28HNss2v7Rau1zdQhvbtg"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What Should I Buy?</h2></div>
<div data-element-id="elm_Nu9y6MjYunzQk52ha7ARhQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Nu9y6MjYunzQk52ha7ARhQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>So what should you buy? At the least, check out our <a href="https://support.newfathom.com/portal/en/kb/articles/workstation-standards" title="Workstation Specification Standards" target="_blank" rel="" style="text-decoration-line:underline;">Workstation Specification Standards</a> and buy in the Standard User column, but if you have some heavy hitters who are very expensive per hour, consider bumping it up! If you have users that are doing billable work for you, then add that into your calculation as well. If you're using a program that requires lots of graphics capabilities, consider upgrading to a dedicated graphics card.&nbsp;</p><p><br></p><p>As a rule, stay away from the following:</p><p>- Pentium, Core Duo, I3, or Ryzen 3 processors. These are garbage for the most part. I wouldn't even want to check email with these.&nbsp;</p><p>- HDDs. They just aren't worth it... ever.</p><p>- Refurbished computers. Yes you can save some money up front, but you're likely to run into issues later. Especially don't buy these if you pay for your IT support because that will get costly really quick.&nbsp;</p><p>- Any computer that is under $500, it's almost always garbage.</p></div>
</div><div data-element-id="elm_mMDGEDcmSP-n0_t5gPDrhQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 10 Jan 2024 22:33:56 -0800</pubDate></item><item><title><![CDATA[Securing Your OT Network]]></title><link>https://www.newfathom.com/blogs/post/Securing-Your-OT-Network</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp"/>Operational technology network security. What is an OT network and what are the best practices for securing an OT network?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0X20OiOiRgKydMYbKirMJQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c3s4sxZuQCyQCHolW7PANQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VTxrJFzjTKisWdiH_HUyXw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4R4ZKTklQw2R0-rEOyy_kA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4R4ZKTklQw2R0-rEOyy_kA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Securing Your OT Network</span></h2></div>
<div data-element-id="elm_GDYgPw7KQBON3h0_Fx7Dmw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GDYgPw7KQBON3h0_Fx7Dmw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;">An OT network, also known as Operational Technology network, is a type of computer network used to manage and control industrial processes and physical devices in various industries such as manufacturing, energy, transportation, and utilities. OT networks are distinct from traditional Information Technology (IT) networks, which primarily deal with data processing, business applications, and general-purpose computing.</span><br></p></div>
</div><div data-element-id="elm_wRMokxjGn_N_UGeand02tg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width: 500px ; height: 333.50px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width:500px ; height:333.50px ; } } @media (max-width: 767px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width:500px ; height:333.50px ; } } [data-element-id="elm_wRMokxjGn_N_UGeand02tg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-medium " src="https://www.newfathom.com/images/premium_photo-1682144509812-4734c830b486" data-src="/images/premium_photo-1682144509812-4734c830b486" width="500" height="333.50" loading="lazy" size="medium" data-lightbox="true"></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Key characteristics of OT networks include:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><ol start="1"><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Industrial Control Systems (ICS)</span>: OT networks are designed to support Industrial Control Systems, which encompass technologies like Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and Programmable Logic Controllers (PLCs). These systems help control and monitor physical processes like manufacturing, power generation, and infrastructure management.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Real-Time Operations:</span> OT networks operate in real-time or near-real-time, ensuring that processes are controlled and monitored with minimal latency. This is essential for maintaining the safety and efficiency of industrial processes.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Specialized Protocols:</span> OT networks often use specialized communication protocols, such as Modbus, PROFIBUS, and OPC, which are optimized for industrial automation and control.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Critical Infrastructure:</span> Many OT networks are associated with critical infrastructure, making them essential for the functioning of various industries and, in some cases, public safety.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Isolation and Segmentation:</span> OT networks are typically isolated or segmented from the broader IT networks to reduce the risk of cyber threats and maintain the integrity of industrial operations.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Robustness:</span> OT network devices and components are built to withstand harsh industrial environments, including extreme temperatures, humidity, and electromagnetic interference.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Concerns:</span> Security in OT networks is crucial due to the potential for cyberattacks that could disrupt operations, damage equipment, or compromise safety. Protecting against these threats is a primary focus in the field of OT cybersecurity.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Legacy Systems: </span>OT networks often incorporate legacy systems and equipment, which can pose challenges in terms of compatibility, security, and maintenance.</span></li></ol></div>
<div><p><span style="font-size:12pt;">The convergence of IT and OT networks, often referred to as IT/OT convergence, is a growing trend as organizations seek to improve efficiency and gain insights from data collected from their industrial processes. However, it also introduces new challenges related to cybersecurity and interoperability between the two types of networks.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-medium " src="https://www.newfathom.com/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp" data-src="/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Security Best Practices for OT Networks</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:16px;"><span style="color:inherit;">Securing an Operational Technology (OT) network is crucial to protect critical infrastructure and industrial processes from cyber threats. Here are some best practices for securing an OT network:</span></span><br></p><div style="color:inherit;"><div><span style="font-size:16px;"></span><ol start="1"><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Network Segmentation: </span>Isolate the OT network from the broader corporate network and the internet. Implement network segmentation to create separate zones for different OT systems and control access between them with “default-deny” firewall rules.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Access Control:</span> Enforce strict access controls to limit who can access and make changes to the OT network. Use strong authentication methods, like multi-factor authentication (MFA), and follow the principle of least privilege. Don’t re-use logins for OT equipment.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Patch and Update Management:</span> Regularly update and patch all software and firmware in the OT network, including industrial control systems (ICS) components and network equipment. Be cautious when applying updates and thoroughly test them in a controlled environment prior to rolling them out to a production environment.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Network Monitoring:</span> Implement continuous monitoring to detect abnormal network behavior or security incidents. Use intrusion detection and prevention systems (IDPS) and security information and event management (SIEM) solutions to analyze network traffic and log data.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Air-Gap Critical Systems:</span> For the most critical OT systems, consider physically isolating them from the network by creating a true air gap. While this may not always be practical, it provides an additional layer of security. This is especially important for legacy equipment that does not get regular security updates.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Policies and Procedures:</span> Develop and enforce comprehensive security policies and procedures specific to the OT environment. These should cover topics like incident response, remote access, and configuration management.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Application Whitelisting:</span> Use application whitelisting to allow only authorized software and applications to run on OT devices and systems. This prevents the execution of unapproved software.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Physical Security:</span> Secure physical access to critical OT infrastructure, such as control rooms and industrial equipment. Install security cameras, access control systems, and alarms to monitor and control entry.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Regular Backups:</span> Implement regular backups of critical data and configurations to ensure rapid recovery in case of a cyber incident or system failure. Backups should be monitored, encrypted in transit and at rest, and have an offsite copy to protect from ransomware.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Incident Response Plan: </span>Develop a well-documented incident response plan specific to OT networks. The plan should outline the steps to be taken in case of a security breach and should be tested periodically. Other incidents to include would be extended power outages and any local relevant natural disasters that could hit your area.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Vendor and Supply Chain Security:</span> Evaluate the security practices of OT equipment and software vendors. Ensure that your supply chain is secure, and that vendors provide timely security updates. Require vendors working on site to use your own managed computers for accessing the systems instead of plugging in directly with their own devices. Require vendors to provide cyber security policies for their own operations.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Regulatory Compliance: </span>Understand and comply with relevant industry standards and regulations specific to your sector, such as NIST, ISA/IEC 62443, or other applicable guidelines.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Assessment and Audits: </span> Regularly engage in security assessments and audits to evaluate the effectiveness of your OT security measures and identify areas for improvement.</span></li></ol></div>
<div><p><span style="font-size:12pt;">Securing an OT network is an ongoing process that requires continuous monitoring, assessment, and adaptation to evolving threats. The specific security measures you implement will depend on the unique characteristics and requirements of your OT environment. Collaboration between IT and OT teams is essential to ensure a holistic and effective security strategy.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_LxuoJjpHNuyWFWJJd9JILw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LxuoJjpHNuyWFWJJd9JILw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you need to have your OT network analyzed and secured, click on the button below to get started!</p></div>
</div><div data-element-id="elm_5NHgQeUhT2KpF3mHJMrvkw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 25 Oct 2023 14:44:49 -0700</pubDate></item></channel></rss>