Search
  • Tom Brannon

Cybersecurity is like privacy - being left alone

Updated: Oct 20, 2018

You're successful if you avoid intrusion. And the need to take action occurs when intrusion occurs. That makes detection a very important part of your company's security (and here's where it gets interesting).

NOBODY'S WATCHING WHAT JUST ARRIVED

PTG is working on new ideas for cybersecurity. We always look for effective ideas, easy to use and inexpensive. These are not always the first thoughts from your IT vendor or even your IT department. Why try to cut the cost of technology or do it the easiest way? Because that strategy always serves the critical IT goals of your company. Don't ignore it - do it . . . but the easiest, least expensive way. We're developing one of these effective, inexpensive ideas - our PTG Detection Tool.


And We're Leveraging Microsoft

If there's a best source for software, hardware, and services, it's Microsoft. In their Cloud Platform they serve up a bundle of best-in-class "stuff." The best of those are included in the tech packages and recommendations of PTG.

At the center of this is the Continuous Integration Model. This means that a number of these apps (that review, monitor, check and report) continuously protect the data you put in your cloud. A number of these are also built into the Intact CodeSolve and PowerLine tools that PTG makes available - and these are free for PTG Members.


DETECTION - The easiest path to data security


Once you take control of your technology (by joining us at PTG) you'll learn a number of ways to protect your data, often at no cost. For example, use the Register App in your Active Service Directory to set the CDN to "STRICT." This flags your Admin if any alteration occurs, whether accidental or malicious.



Use the data and the apps you already have to "watch your back"


Imagine the first steps to identifying any type of hack or intrusion being a quick look at the checksum from close-of-business (or midnight) and comparing this to opening the next morning. Similar comparisons will display the computed value which depends on the contents of a block of data and which is transmitted or stored along with the data in order to detect corruption of the data. The receiving system recomputes the checksum based upon the received data and compares this value with the one sent with the data. If the two values are the same, we can say with some level of confidence that the data was not tampered with, and that no malicious code was added to your applications.


Don't overlook the value that's barely hidden in your technology


"Oh no, we were hacked. We've been leaking data for the last 6 months!" That seems to be the common scenario - sometime after the fact . . . Using the Detection Tool should tell you within 24 hours. You may not end up using the Detection Tool - you may already have a robust data security portfolio. but reading this, and knowing this has increased your Technology IQ and that's what the Participatory Technology Group is all about. Comment with your stories about data security - spread the wealth!

9 views

Recent Posts

See All

Tom's LinkedIn Posts

CoVID Effects on Technology Tom Brannon on LinkedIn INTRODUCTION It will become apparent to many of us in coming days that the coronavirus is not only dangerous to humans but is damaging technology as

Larry Speaks Out on AccessDB

Excerpts from email FAQs on the Imperative to Retire Access LARRY AULTMAN EMAILS: 12/12/2018: TITLE – Ten Gotchas - AccessDB will NOT run in Windows 10 Today we inform all U.S. AccessDB users of some

© 2023 by Participatory.Technology. Proudly created with Wix.com.