IT SECURITY IS NO LONGER OFFERED AS AN EXTRA SERVICE — IT’S AN ESSENTIAL PART OF EVERY SOLUTION PROVIDER’S PORTFOLIO. IN FACT, IT SECURITY IS CONSISTENTLY A TOP PRIORITY FOR COMPANIES, A TREND THAT DOESN’T SEEM LIKELY TO CHANGE.
Here are top security resources brought from CompTIA and the IT Security Community:
1. IT SECURITY ASSESSMENT WIZARD
Start the security infrastructure conversation with help from the IT Security Assessment Wizard. Created by members of CompTIA’s IT Security Community, this web-based, vendor-neutral tool uses a simple question-and-answer format to help you walk clients through a variety of security questions, and then produces a comprehensive customer profile focused on existing hardware, policies and security tools, plus security tools that could be added. Use the report as a springboard for what you can offer, including service, consulting and products.
2. PERIMETER HEALTH CHECK
Setting up foundational security can be challenging due to the complexity of today’s security systems. Sometimes controls get removed accidentally during troubleshooting or policy changes and systems are left open and vulnerable. This simple guide created by the IT Security Community is an easy way to manually test your foundational security to ensure the proper controls are in place.
3. DOWNTIME COST CALCULATOR
The Downtime Cost Calculator allows the solution provider to enter some basic information and show their clients and prospects how much downtime costs. The calculator also shows whether the Recovery Time Objective (RTO) and the Recovery Point Objective (RPO) are met. From there, solution providers can transition easily to a conversation about additional services and solutions to minimize the cost of downtime. This simple, easy to use calculator offers real data that is as accurate as the data supplied by the client.
4. CULTURE OF CYBERSECURITY
“Executive Brief: Building a Culture of Cybersecurity, A Guide for Corporate Executives and Board Members” explores the necessary steps for creating a powerful cybersecurity strategy and for developing cybersecurity best practices from the top down and how corporate executives can make it happen.
5. CYBERSECURITY STANDARDS WORKBOOK
The U.S. National Institute of Standards and Technology has put forth five pillars of IT security — Identify, Protect, Detect, Respond, Recover — which it recommends as the collective foundation for a sound, comprehensive cybersecurity strategy. CompTIA’s Industry Standard for Cybersecurity puts these five pillars to work for you and the organizations you serve. This 106-page workbook helps you assemble a replete cybersecurity agenda, complete with a checklist of activities and recommendations for developing a set of best practices for your organization.
How do solution providers generate revenue and give their customers the best user experience possible while keeping their systems and data as secure as possible? These peer developed videos will help you engage in the right conversations to ensure that your clients get the best possible business protection (and business outcomes).
7. TRENDS IN CYBERSECURITY: BUILDING EFFECTIVE SECURITY TEAMS
As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns. New technology, improved processes and broad workforce education are all required for a modern security posture. Adopting a new approach requires cultural change within an organization, but it also requires a diverse set of skills. This report examines the ways that businesses are building security teams, using internal and external resources to assemble the expertise needed for security in the digital age.