Best Free Computer Incident Response Templates and Scenarios

Welcome! You may use these incident response templates and scenarios internal to your business and team.   You do not have permission to claim ownership, re-publish this material to the public, or sell it.  All text is original work by Kieri Solutions LLC: V. Amira Armond. Table of contents 1:  What is incident response.   2.  Before …Read More…

Network hardening near Baltimore MD, Frederick, Rockville, Gaithersburg and DC

If you want to take your cyber-security to the next level, consider network hardening and segmentation. NIST security publications encourage ‘defense in depth’ as a best practice.  They recommend creating multiple network segments with strong firewalls in between.   The diagram above shows a cost effective segmentation design that is appropriate for medium businesses. By separating …Read More…

Approaches to security policy

Here are common strategies for security policy, for better or worse. Plug the Holes This approach is used by enterprises and big business – those with a $10,000,000+ budget for their IT department. Enterprises need a full-functioned network.  They need ten different versions of Microsoft servers and desktops, Office, Adobe, Internet Explorer, File sharing, Websites, and …Read More…