Cybersecurity Awareness Month (CAM): Awareness, Meet Action Optiv.

We’re about awareness, but we are also about informed, results-focused action … and not just in October.

 

Throughout this month, this is where we’ll share updates, with more in-the-trenches stories on how we’ve helped customers protect themselves during the pandemic and beyond… showing you how we can help protect your people and your organization – right now.

 

The Future of Connected Devices is So Bright, We Have to Wear a Welder’s Mask

 

What’s in your house? Smart speakers? Smart TVs? A smart fridge? By 2025 there’ll be 75 billion interconnected devices. But wait, there’s a smart speaker in the office? A smart fridge in the lunchroom? IoT is everywhere. Everywhere. Fear not. Here’s how we secured them.

 


CAM Awareness Letter Image

Week 4 - The Future of Connected Devices

Image
CAM Week 4 Blog Image

 

BLOG

 

The Future of IoT: More “Connected” Than “Devices”

No one can predict the future. But we do know the Fourth Industrial Revolution is here. What is it? What does it mean for cybersecurity?

 

 
Image
CAM VLOG Week 4 Image

 

VLOG

 

IoT and IoT Data in the Future

In our final CAM video segment, Sean Tufts talks about IoT proliferation, its data, what it shares and where, and security. Knowing where IoT data moves and how it’s merging is key to protecting it. Ooh! Data location awareness!

 

 
Image
Cybersecurity-in-Action_ListImage_476x210

 

INFOGRAPHIC

 

COVID-19 Cybersecurity in Action

Disruption begone! Well almost. Our interactive guide to conquering cybersecurity challenges can help. Here there be use cases. Resources. Actionable steps (for now AND later). Problems we solved during COVD-19 – and can solve for you right now. 2021 is nearly here. With Optiv, you can keep calm and innovate on!

 

Image
Blog_Streamlining-Incident-Response_list_476x210

 

BLOG

 

About Your Incident…

Detect. Respond. Remediate. It all requires speed and corralling details. Here’s how to get all that and more, regardless of your technology vendor.

 

Image
CDX_OT-Service-Brief_list_476x210

 

SERVICE BRIEF

 

Old Operational Technology Devices Were Siloed and Protected. But Now…

Deploying new OT devices means maximizing digital transformation and using information to manage technology better: increasing output and reducing costs and downtime. But using OT device data can alter your threat landscape. It's time to securely bridge the gap between IT and OT systems.

 

Image
CAM Week 4 Poster Image

 

POSTER

 

Stay Cyber Aware All Year.

Cybersecurity awareness isn’t something to give attention to for just a month every year. Stay cyber aware all year with this poster. Print it and post it or use it as desktop wallpaper.

 

Week 3 - Securing Internet-Connected Devices in Healthcare

Image
TL_CAM_WelcomeLetter_week2of5_Flyer_Image-Set_List-Image_476x210

 

WELCOME LETTER

 

Hackable Secure Healthcare Technology

Patients are stressed when they seek care. Worrying about their health records needs to not add to it. Protecting patient information by securing healthcare technology – including IoT – is possible, with a strategy.

 

 
Image
TL_CAM-Week3-Image-Set_Blog_List-Section-Thumbail-Image_476x210

 

BLOG

 

“Safe and Sound” in a Hospital?

Healthcare must have an effective IoT security strategy (including staff training) in order to protect: infusion and insulin pumps.; Wireless vital monitors; Thermometers; Smart pens; MRI systems; Blood gas analyzers; CT scans; anesthesia machines; x-ray machines and pacemakers. It’s a lot … and it matters.

 

Image
TL_CAM Week#3_Vlog_Image-Set_List-Image_476x210

 

VLOG

 

Healthcare IoT : A $160B Market?

Data explosions. The immediate need for data access on devices of all types—by whom, how do they access it, and where is it? How is this all gonna work, and how can you make sure patient records are secure.?

 

Image
Cybersecurity-in-Action_ListImage_476x210

 

INFOGRAPHIC

 

The COVID-19 Ruckus and The Butterfly Effect

A rush into cloud adoption. The data surge. There have been wide-reaching changes and that means repercussions. Here’s what happened, why it happened, and how to prepare to emerge confidently in 2021.

 

Image
CAM Week 3 Healthcare Case Study Image

 

CASE STUDY

 

140M Customers. 250,000 Endpoints. Eight Terabytes of Raw Log Data. How’d We Help?

How did a large healthcare organization reduce incident response time from hours to minutes, save hundreds of thousands of dollars a month on fraud detection analysis and trade data chaos for data analysis, data aggregation and automated incident response?

 

Image
Risk NPI Image

 

BLOG

 

The Good, the Bad and the Ugly: A National Patient Identifier (NPI)

The good - an NPI might improve patient privacy, help reduce medication errors, decrease mismatched patients, etc. The bad AND the ugly: Is anyone talking about its impact on healthcare cybersecurity and how new controls and policies are needed? Here’s a deep dive.

 

Image
CAM Week 3 Poster Image

 

POSTER

 

#BeCyberSmart – Get Your Reminder Poster

Work in healthcare? Help your team stay mindful of their actions. Deploy it as desktop wallpaper too.

 

Week 2 - Securing Devices at Home and Work.

Image
TL_CAM_WelcomeLetter_week2of5_Flyer_Image-Set_List-Image_476x210

 

WELCOME LETTER

 

Securing Devices at Home and Work.

So many devices. So little time to secure them. Let’s add in doubling your workforce and a pandemic forcing remote work en masse. So how did we help?

 

 
Image
CAM Week 2 Blog Image

 

BLOG

 

Remote Employee “Smart” Homes = More Vulnerabilities

Company laptops on home networks that have IoT you can’t see? Let’s wrestle that to the ground.

 

 
Image
CAM VLOG Week 2 Image

 

VLOG

 

Tame Security Nightmares by … Talking?

Work-from-home newbies on unknown networks, that'll fuel your nightmares well past October. Listen, as Optiv IoT expert Sean Tufts talks about how you can keep your organization safer by simply getting those remote workers to talk to IT – before they act.

 

Image
CAM Week 2 Remote Worker LP Image

 

WEBPAGE

 

Damage Control for Remote Working.

It went from a company perk to “holy !$*&! get out of the office now!” And for IT and security pros - it was like waking up on a different planet. The solution is NOT another box. Instead, make better use of the technology you have.

 

Image
CAM Week 2 Remote Work From Home Service Brief List Image

 

SERVICE BRIEF

 

Weaker Link #2: Remote Workers

Home-based employees are accessing the same sensitive data as always, but are their local networks secure? That’s called gaps. Here's a customized WFH assessment to guide you on where to start and what to do to be more secure.

 

Image
CAM Week 2 Poster Image

 

POSTER

 

Security. Every Day. No Delay.

Help your employees stay mindful of their actions. Use it as a poster or as a desktop wallpaper to reinforce awareness.

 

Week 1 - If You Connect It, Protect It.

Image
TL_CAM_WelcomeLetter_week2of5_Flyer_Image-Set_List-Image_476x210

 

WELCOME LETTER

 

Everything is Interconnected. Good or Bad?

IoT isn’t isolated. It’s ubiquitous. No, bigger than that. How big and why should you care if it’s secure? Whack. It’s about to impact both your users and environment.

 

 
Image
CAM Week 1 Blog Image

 

BLOG

 

Why IoT is the New Weak Link.

IoT security is today’s “herding cats.” Here’s how attackers exploit the proliferation of IoT and what we recommend to harden your sentries.

 

Image
CAM Week 1 Vlog Image

 

VLOG

 

It's more than Echo ... Echo ... Echo…

It's not just about your home speaker anymore. One of our IoT security experts, Sean Tufts, talks about how embedding IoT devices in various organizations is more than just problematic – it’s about the temperature of a chicken.

 

Image
CAM Week 1 eBook Image

 

EBOOK

 

Joe Disruptive vs. Jane in IT – Who Will Win?

You may have more than one – the employee who is a constant security disrupter. What can you do? Read about what Jane did – with Optiv’s help. 

 

Image
CAM Week 1 Whitepaper Image

 

WHITEPAPER

 

Cameras. Badge Printers. Smart Displays. Sensors. Thermostats. All Vulnerable. Now What?

Who wants anyone cracking into their internet of things (IoT) to steal their private data? No one, right?!? Because so many devices are connected, the possibility that an adversary will try to exploit these weaknesses is likely. However, ensuring the security of these endpoints is nearly impossible without knowing which devices are connected and tracking their activities. Get embedded devices into your vulnerability management program with these techniques.

 

Image
CAM Week 1 Service Brief Image

 

SERVICE BRIEF

 

Fix Your IoT Chaos

IoT devices. Are they becoming huge tools for how your company pivots in the market? They can increase your competitive advantages and make you more efficient. But they also expand your threat landscape. Managing their security is crucial.

 

Image
CAM Week 1 Poster Image

 

POSTER

 

#BeCyberSmart – Get Your Reminder Poster

Help your employees stay mindful of their actions. Use it as a poster or as desktop wallpaper.

 

Awareness AND Action Tools for CAM and Beyond.

Image
TL_CAM_WelcomeLetter_week2of5_Flyer_Image-Set_List-Image_476x210

 

WELCOME LETTER

 

CAM: Protect People and Organizations Through Proactivity

October is Cybersecurity Awareness Month (CAM), launched by The National Cyber Security Alliance in partnership with the Cybersecurity and Infrastructure Security Agency (CISA). The 2020 theme for CAM is ‘Do Your Part. #BeCyberSmart’ – focused on enabling individuals and organizations to know how they can help protect themselves. For Optiv, this means combining awareness with action. And for you, it means learning what to do and how we can help.

 

Image
CAM Kick-Off Week Blog Image

 

BLOG

 

Cybersecurity Awareness Month (CAM) has Gone Global

Four weeks of information, insight and tools to help translate awareness into action. Cybersecurity Awareness Month now lasts 365 days – start here.

 

Image
CAM Kick-Off Week Video Image

 

VIDEO

 

Cybersecurity is Everyone’s Responsibility

Your employees can learn why they need to be aware – and what action they can take – in less than two minutes.

 

Image
CAM Kick-Off Week SAT Image

 

TRAINING

 

Empower Your People = Protect Your Organization

Human risk. Insider threats. No matter what you call it, people are your weakest link. One of the best ways to change human behavior is the correct training with the right partner.

 

Image
CAM Kick-Off Week SAT Guide Image

 

SERVICE GUIDE

 

Security Awareness Training from A to Z – powered by Optiv

Your training requirements are as unique as your people. So we’ve got a wide variety of eLearning courses and Threat Emulation services to help keep your employees security-aware. Our engaging programs are designed to help you meet compliance requirements, minimize risks and maximize data security.

 

How Can We Help?

Image
CAM Week 1 Full Poster
Image
CAM Week 2 Poster
Image
Cam Week 3 Poster
Image
CAM Week 4 Poster