This month’s spotlight EEF Worksheet is on Citrix Virtual Apps and Desktops 7.X. Citrix is a EUC technology company that focuses on both EUC and SD-WAN. Citrix is leveraged in a 3rd party remote worker or contractor use case in many companies today. This technology had many complaint and security capabilities to support this capability but based on the EEF gap analysis it highlights where it is susceptible to advanced phishing techniques using social engineering and programming expertise, bots, and ransomware threats without both advanced configuration and 3rd party integrations. Are you using Citrix for remote contractors? Are you configured for the gaps? Like OS security flaws visibility, governing access and control, Virus scanning and Compliance monitoring? Use this month's EEF for Citrix Worksheet to help build your gap analysis for your contractors and remote workers
NIST is an organization with strong values, reflected both in our history and our current work. NIST leadership and staff will uphold these values to ensure a high performing environment that is safe and respectful of all.
Security breach laws typically have provisions regarding who must comply with the law (e.g., businesses, data/ information brokers, government entities, etc); definitions of “personal information” (e.g., name combined with SSN, drivers license or state ID, account numbers, etc.); what constitutes a breach (e.g., unauthorized acquisition of data); requirements for notice (e.g., timing or method of notice, who must be notified); and exemptions (e.g., for encrypted information) All 50 US states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or governmental entities to notify individuals of security breaches of information involving personally identifiable information.
Copyright © 2018 Jaymes Davis All Rights Reserved.