<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity Archives - Bridgehead Security</title>
	<atom:link href="https://bridgeheadsecurity.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://bridgeheadsecurity.com/tag/cybersecurity/</link>
	<description>Security For The Energy Industry</description>
	<lastBuildDate>Sat, 26 Apr 2025 02:30:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://bridgeheadsecurity.com/wp-content/uploads/2024/10/cropped-Bridge-only-32x32.png</url>
	<title>cybersecurity Archives - Bridgehead Security</title>
	<link>https://bridgeheadsecurity.com/tag/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity Readiness Goals</title>
		<link>https://bridgeheadsecurity.com/2024/12/19/cybersecurity-readiness-goals/</link>
		
		<dc:creator><![CDATA[Ross Johnson]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 19:31:52 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[CCCS]]></category>
		<category><![CDATA[CRG]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Readiness Goals]]></category>
		<guid isPermaLink="false">https://bridgeheadsecurity.com/?p=580</guid>

					<description><![CDATA[<p>One of the great things about the work I do is that I am exposed to a lot of free resources that I can then pass on to you. I was in Ottawa last week attending a conference held at the Canadian Centre for Cyber Security. (For those who might not have heard of them [&#8230;]</p>
<p>The post <a href="https://bridgeheadsecurity.com/2024/12/19/cybersecurity-readiness-goals/">Cybersecurity Readiness Goals</a> appeared first on <a href="https://bridgeheadsecurity.com">Bridgehead Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>One of the great things about the work I do is that I am exposed to a lot of free resources that I can then pass on to you.  </p>



<p>I was in Ottawa last week attending a conference held at the Canadian Centre for Cyber Security.  (For those who might not have heard of them before, the CCCS is a government organization that provides advice and information to Canadians and Canadian organizations and businesses on cybersecurity.  They are fantastic people: knowledgeable, helpful, and client-oriented.  If there is a bigger supporter of the CCCS out there, I want to know who they are and why they are a bigger supporter than me.)</p>



<p>Here is a page from the CCCS website that &#8220;<a href="http://provides resources from the Cyber Centre to help Canadian organizations and critical infrastructure increase their cyber security  readiness. This includes information on current cyber threats, steps to protect against them and ways respond to and recover from incidents.">provides resources from the Cyber Centre to help Canadian organizations and critical infrastructure increase their cyber security <a href="https://www.cyber.gc.ca/en/cyber-security-readiness#defn-cyber-security"></a> readiness. This includes information on current cyber threats, steps to protect against them and ways respond to and recover from incidents.</a>&#8221;  </p>



<p>Here is a page that introduces their publication &#8220;<a href="https://www.cyber.gc.ca/en/cyber-security-readiness/cyber-security-readiness-goals-securing-our-most-critical-systems">Cyber Security Readiness Goals: Securing Our Most Critical Systems</a>&#8220;</p>



<p>And here is the page for their &#8220;<a href="https://www.cyber.gc.ca/en/cyber-security-readiness/cross-sector-cyber-security-readiness-goals-toolkit">Cross-Sector Cyber Security Readiness Goals Toolkit</a>.&#8221;  </p>



<p>The CRG was published at the end of October this year, so this information is very fresh.</p>



<p>I hope you find it useful, or know someone who will.</p>
<p>The post <a href="https://bridgeheadsecurity.com/2024/12/19/cybersecurity-readiness-goals/">Cybersecurity Readiness Goals</a> appeared first on <a href="https://bridgeheadsecurity.com">Bridgehead Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Salt Typhoon and You</title>
		<link>https://bridgeheadsecurity.com/2024/12/19/salt-typhoon-and-you/</link>
		
		<dc:creator><![CDATA[Ross Johnson]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 17:20:05 +0000</pubDate>
				<category><![CDATA[Communications Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[communications security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[information protection]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<guid isPermaLink="false">https://bridgeheadsecurity.com/?p=578</guid>

					<description><![CDATA[<p>The US Cybersecurity and Infrastructure Security Agency (CISA) has issued guidance on a recent hack by the Chinese Advanced Persistent Threat group called Salt Typhoon, and as it deals with communications methods we all use every day, we should pay attention to it. The document is called &#8220;Mobile Communications Best Practice Guidance&#8221; and it is [&#8230;]</p>
<p>The post <a href="https://bridgeheadsecurity.com/2024/12/19/salt-typhoon-and-you/">Salt Typhoon and You</a> appeared first on <a href="https://bridgeheadsecurity.com">Bridgehead Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The US <strong>Cybersecurity and Infrastructure Security Agency (CISA)</strong> has issued guidance on a recent hack by the Chinese Advanced Persistent Threat group called Salt Typhoon, and as it deals with communications methods we all use every day, we should pay attention to it.<br><br>The document is called &#8220;<strong>Mobile Communications Best Practice Guidance</strong>&#8221; and it is available online here: <a href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf</a><br><br>The guidance also includes advice specific to iPhone and to Android phones.<br><br>The simplest version of the advice is this: if the information is sensitive, don&#8217;t use cellular voice or SMS, as they are both unencrypted.  You need end-to-end encryption, which you will get with the iPhone iMessage, Meta&#8217;s WhatsApp, and Signal.<br><br>I strongly urge you to go to the CISA link (above) and read the guidance they provide.</p>



<p></p>
<p>The post <a href="https://bridgeheadsecurity.com/2024/12/19/salt-typhoon-and-you/">Salt Typhoon and You</a> appeared first on <a href="https://bridgeheadsecurity.com">Bridgehead Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
