Meridian Celebrates Cyber Security Awareness Month

Since 2003, October has been recognized as National Cyber Security Awareness Month (NCSAM). This collaboration between the U.S. Department of Homeland Security (DHS) and the National Cyber Security Alliance started this initiative to ensure the safety and security for individuals or companies during their online experiences.  

There are various types of cyber threats that result in daily occurrences. The Government Accountability Offices (GAO) mentions these threats consist of Bot-network operators, criminal groups, foreign intelligence services, hackers, insiders, phishers, spammers, spyware/malware authors, and terrorists. These threats do not just threaten the U.S. Federal Government and Critical Infrastructure, but also small businesses or individuals.  Everyone is at risk. A successful cyber-attack could have severe impacts emotionally, economically, and environmentally.

Meridian’s Cyber Security Approach identifies threats & vulnerabilities, assesses risk exposure, develops protection & detection measures, establishes contingency plans, and responds and recovers from cyber security incidents. Meridian has multi-skilled specialists that can deliver Cyber Security services that includes:

  • Cyber Security Policies
  • Cyber Security Management Plans
  • Cyber Security Procedures
  • Cyber Risk Assessments
  • Office Contingency Plans
  • Vessel Contingency Plans
  • Cyber Security Training & Awareness

10 Basic Cybersecurity Measures (Water ISAC)

  1. Maintain an Accurate Inventory of Control System Devices and Eliminate Any Exposure of this Equipment to External Networks
  2. Implement Network Segmentation and Apply Firewalls
  3. Use Secure Remote Access Methods
  4. Establish Role-Based Access Controls and Implement System Logging
  5. Use Only Strong Passwords, Change Default Passwords, and Consider Other Access Controls
  6. Maintain Awareness of Vulnerabilities and Implement Necessary Patches and Updates
  7. Develop and Enforce Policies on Mobile Devices
  8. Implement an Employee Cybersecurity Training Program
  9. Involve Executives in Cybersecurity
  10. Implement Measures for Detecting Compromises and Develop a Cybersecurity Incident Response Plan

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*
*