Over the past few blogs we have studied some of the benefits of implementing monitoring solutions. While compliance drives this need for many industries, businesses will also find cost saving by uncovering breaches faster and decreasing overall investigation times. We have gone over the pros and cons of outsourcing the work. In the final part of this series we will summarize this information and discuss how Tandem Cyber Solutions approaches the topic.
In our latest blog installments on monitoring, we spoke about compliance and decreasing overall detection times. These two benefits alone are fantastic; however, why should organizations monitor logs from their environment? And if they do, should they use a centralized logging platform (SIEM)?
In part two of our month-long series on the benefits of monitoring network and system events (audit logs), we will be discussing how with more insight, companies can detect a breach more quickly. A misconception is that if logs are aggregated and people are watching the logs, bad guys will be found. False! Depending on the logs collected, the capabilities of an analyst and the signatures in the SIEM, experiences may vary.
Today, the South Carolina Department of Insurance released Bulletin 2018-09 Cybersecurity Event Reporting Form. Why should you read it? This bulletin focuses on how the Department of Insurance defines a reportable cybersecurity event and the notification procedures. The three main take aways from the bulletin are:
Follow this link to view the latest bulletin from the DOI. For your convenience we have attached both the bulletin and the updated event report form below. You may also want to review previous blogs about the IDSA and how you too can sign up for IDSA update notices from the DOI.
If you have any questions on SC Insurance Data Security Act compliance, Call Tandem Cyber Solutions today!