Malware Manual – Part 4: Basic Tactics for Cybersecurity Monitoring & Maintenance


Joe Higgins

Apr 18, 2019

In the last installment of our Malware Manual series, we called today’s business security challenges a “cyber siege in the digital realm” because to many companies – large or small – the onslaught of cybercrime can feel like one. Why? Check out this sampling of recent headlines from around the globe and across industries:

  • Marriott’s data breach may be the biggest in history. Now it’s facing multiple class-action lawsuits” – Vox, January 11, 2019
  • Humana notifies members of 2018 security breach” – Becker’s Health IT & CIO Review, January 7, 2019
  • Average Cost Per Record of US Data Breach $148” – NBC News, July 30, 2018
  • Facebook Says 6.8 Million People's Private Photos Were Exposed” – Thrillist, December 14, 2018
  • Hackers target PGA servers, seek Bitcoin ransom” – Golfweek, August 8, 2018

For a thorough, structured approach to coping with these multiplying cybersecurity risks, we advocate applying the Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST). The NIST framework promotes five tenets for holistically managing cybersecurity: Identify, Protect, Detect, Respond, Recover.

For the third tenet of the NIST framework, “Detect,” we’ve touted many times in this blog the support of IT Managed Services Providers (MSPs) for continuous monitoring and maintenance services. Yes, making your own staff aware of cyber risks and educating them about recognizing cyber attacks is critical, as we’ve argued in many past posts such as “Why Education is Your Best Cybersecurity Defense.” But patrolling the vast virtual perimeter of your business is a big job these days, especially in the era of digital transformation. So, navigating the cybersecurity landscape alone is not a course we recommend.

So, what should your team of IT MSPs and internal staff being doing to monitor and maintain a cybersecure organization? We reviewed advice from security experts. Here’s a digest of basic tactics.

In addition to Cardwell’s list, Howard suggests testing for weaknesses in your systems on a recurring basis – even hiring professional hackers as guides on occasion. Plus, as we’ve counseled in several posts, performing consistent backups.


  1. StevSymn on September 30, 2019 at 10:26 am

    Cialis Pas Cher Espagne cheap cialis online Cephalexin Shelf Life What Does Amoxicillin Cure Canadian Drug Store No Script

  2. read more on November 12, 2019 at 12:24 am

    whoah this blog is magnificent i love studying your articles.

    Keep up the great work! You realize, lots of persons are hunting round for this info,
    you could aid them greatly.

  3. instagram takipçi satın al on November 13, 2019 at 8:47 am

    takipçi al

  4. their website on November 18, 2019 at 4:52 pm

    Good article. I am going through many of these
    issues as well..

Leave a Comment