Twitter Feed
    Share

     

     

    Maximus Impact is a full-service information security consulting firm offering a comprehensive range of security and auditing services.

    Services include but are not limited to:

     

    • Risk Management
    • Assessments
    • Security Audits
    • Privacy Audits and Assessments
    • IT Auditing
    • Strategic Consulting
    • Internal Controls
    • Web Application Assessments
    • Policy and Procedures
    • IT Project Management
    • e-Discovery
    • Forensics
    • Data Recovery
    • Disaster Recovery
    • Business Continuity
    • Internet Security Testing
    • Intranet Security Testing
    • Database Assessment
    • Physical Security Testing
    • Wireless Assessment
    • Social Engineering Assessments
    • Training


    Share
    Maximus Impact Consulting is proud to be affiliated with a great company Impact! Interior Design Solutions. Go check out the fine work Impact! Interior Design Solutions has completed. Impact! Interior Design Solutions is also proud to be a sponsor of the 2013 Bras for a Cause Event. Read the rest of this entry »
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of approximately 69 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services and Norton™ consumer products, and other third-party data sources. Read the rest of this entry »
    The publication analyzes the different types of digital credentials used in authenticating the identity of remote users of information systems and recommends practices to improve system security and information privacy Read the rest of this entry »

    National Institute of Standards and Technology (NIST) – Security and Privacy Controls for Federal Information Systems and Organizations

    Latest Daft – Comments on SP 800-53, Revision 4 should be sent by March 1, 2013, to sec-cert@nist.gov.

    NIST -Security and Privacy Controls for Federal Information Systems and Organizations

    “…Through the process of risk management, leaders must consider risk to US interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations… “

    “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations…”

    “…Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other domain…”

    — THE NATIONAL STRATEGY FOR CYBERSPACE OPERATIONS OFFICE OF THE CHAIRMAN, JOINT CHIEFS OF STAFF, U.S. DEPARTMENT OF DEFENSE

    Share

     

    From the Sun Tzu masterpieceThe Art of War

    It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.

     

    Translation

    • If you know others and know yourself, you will not be imperiled in a hundred battles; if you do not know others but know yourself, you win one and lose one; if you do not know others and do not know yourself, you will be imperiled in every single battle.
    • Know your enemy and know yourself, find naught in fear for 100 battles. Know yourself but not your enemy, find level of loss and victory. Know thy enemy but not yourself, wallow in defeat every time.

     

    Share
    Symantec and the Ponemon Institute report on cost of Data Breaches Read the rest of this entry »
    In 2011, The National Institute of Standards and Technology (NIST) released a revised edition of their 2006 publication NIST's Glossary of Key Information Security Terms Read the rest of this entry »
    Cyber crimes continue to be costly. We found that the average annualized cost of cyber crime for 56 organizations in our study is $8.9 million per year, with a range of $1.4 million to $46 million. In 2011, the average annualized cost was $8.4 million. This represents an increase in cost of 6 percent or $500,000 from the results of our cyber cost study published last year. Read the rest of this entry »
    Privacy is an uphill battle, and we are hearing more reports daily of the exposure of data at our trusted healthcare organizations. Healthcare organizations seem to face an uphill battle in their efforts to stop and reduce the loss or theft of protected health information (PHI) or patient information Read the rest of this entry »
    Security researchers decided to cancel a planned demonstration of security holes in industrial control systems from Siemens following requests from the German manufacturer and a security response team. Read the rest of this entry »
    Follow Us

    Translate
    AlbanianChinese (Simplified)Chinese (Traditional)CzechDutchEnglishFrenchGermanItalianJapaneseKoreanLithuanianPortugueseRomanianRussianSerbianSpanish