Search
Certified Public Accountants
& Business Consultants

Cyber Security Advisory Services


It’s a matter of when, not if, you will be impacted by a cyber security breach. With the emergence of the cloud and growing engagement through mobile and social networks, IT and business processes need to adapt in order to meet new compliance requirements and general best practices. RubinBrown has a dedicated team specializing in cyber security services designed to meet each client’s requirements.

Cyber Security Advisory Services from RubinBrown

One size does not fit all. Most clients’ security requirements are unique, changing as new threats emerge and your business grows. RubinBrown's Cyber Security Group employs a pragmatic risk-based approach and provides the following services:

  • Security status health checks
  • Policy and procedure enhancements
  • Vulnerability assessments
  • Penetration testing
  • Breach response planning
  • On-demand Chief Information Security Officer services
  • SOC2 controls advisory and reporting

Assessments can be performed from an external or internal perspective and cover networks, web applications or mobile devices.

Our information security projects include two levels of feedback:

  • Actionable, management and board-ready deliverables
  • Technical recommendations and knowledge transfer

Is cyber security a concern for your company?

Do you have security concerns reported to you/executive leadership?

Has your company been breached?

What is the most important information to protect?

Who would know if your company has been breached?

Do you have audit, regulatory or compliance requirements for annual security testing?

  • Certified professionals including:
    • CISSP
    • CISM
    • CISA
    • PMP
    • ITIL
    • ISSMP
  • Specialized security skills and broad industry experience
  • Scalable solutions for compliance management
  • Global delivery capabilities through the Baker Tilly International network

05/18/2017

Focus on Cyber Security: Global Ransomware Attack


The WannaCry (aka WannCrypt, WannaCrypt0r 2.0 and Wcry) global ransomware attack raises significant concerns about wide scale attacks from self-propagating ransomware. It appears the initial threat has been stopped by malware researcher MalwareTech. However, the underlying threat is still present and there is consensus copycat (and better designed) attacks are imminent.

01/26/2017

Focus on Cyber Security: Vulnerability Management


RubinBrown Cyber Security Center of Excellence – Security You Need to Know. New vulnerabilities are identified every day. Most of us have workstations set to auto-update, servers and applications are handled by the systems administrators, but there are more and more products, devices and applications in our environments. How do you track the patches and updates for all those manufacturers and providers?

10/18/2016

Focus on Cyber Security: October is Cyber Security Awareness Month


Training Resources to Reduce your Risk. We all need security awareness training. Whether you just know it, it is required for compliance or a recent security assessment recommended it, we all know we need more security awareness training. Great News! October is National Cyber Security Awareness Month!

09/28/2016

Focus on Cyber Security: Cyber Attest - The Changing Landscape


We are on the brink of a major shift in the cyber security landscape. Cyber attest allowing a focus on the entire cyber risk environment as well as a focus on particular systems. New proposed legislation, PCAOB discussions and new criteria from the AICPA on cyber attestation standards are all signs of impending changes that will require cyber security integration throughout the environment to provide transparency and assurance. Here are some of the proposed changes we believe could change the cyber security landscape.

09/09/2016

Focus on Cyber Security: Protecting Against Cyber Extortion


Prevent, detect, recover and above all else prepare. Ransomware holding data hostage. Threats to release sensitive information. Disruptive denial-of-service attacks. All are extortion schemes used by cyber criminals to separate you from your money. Extortion schemes are not new, but cyber criminals are constantly looking for new ways to use our technology against us.

07/07/2016

Focus on Cyber Security: Maintaining Security When Using Amazon Web Services


Moving data storage and processing to the cloud has been a growing trend for several years. As companies realize maintaining expensive computing infrastructure resources are no longer necessary, businesses are considering services like Amazon Web Services (AWS) to handle their infrastructure needs.

03/03/2016

Focus on Cyber Security: U.S. Government Ramping Up on Cyber Security


The Cyber Security National Action Plan – what to expect. On the surface the news of the Cyber Security National Action Plan sounds impressive – increasing the federal government’s investment in cyber security by 35% to $19 billion and creating a Federal Chief Information Security Officer position.

02/16/2016

Focus on Cyber Security: Your Internet Explorer Could Be Exposed


Microsoft Ending Support for Internet Explorer 8, 9 and 10.

Why do you need to care Microsoft ended support on Internet Explorer 8, 9 and 10 on January 12, 2016? We all use web browsers all the time. In fact, you may be reading this with a web browser right now. If you, or your organization, still use any of those versions of Internet Explorer you will no longer receive patches and updates, putting your system and organization at risk.