Threat Intelligence Blog

Contact us to discuss any insights from our Blog, and how we can support you in a tailored threat intelligence report.

Black Arrow Admin Black Arrow Admin

What is the CIA Triad? You're probably heard it mentioned but what is it, and why do you need to know it - Cyber Tip Tuesday video

What is the CIA Triad?

In any conversation you may have been involved in relating to cyber or information security you may have heard reference to the 'CIA triad' - but what exactly is it? And why you need to know what it represents

What is the CIA Triad?

In any conversation you may have been involved in relating to cyber or information security you may have heard reference to the 'CIA triad' - but what exactly is it?

And why you need to know what it represents

Read More
Black Arrow Admin Black Arrow Admin

What is the CIA, or AIC, Triad? Cyber Tip Tuesday video

Welcome to this week's Black Arrow Cyber Tip Tuesday, this week Tony talks about the CIA, or AIC, triad What is the CIA triad, or AIC triad to distinguish it from one of the US intelligence agencies? C, I & A relate to Confidentiality, Integrity and Availability. Confidentiality is the protection of IT assets and data from unauthorised users. Integrity is ensuring that data is accurate, able to be relied upon and has not been changed or modified in an unauthorised manner and availability is ensuring that IT assets, data and networks are available to authorised users when they need it to be. A loss of any one of these could be catastrophic to your business so you need to make sure you have appropriate controls in place to protect and if necessary recover from any problems. Talk to us to see how we can help you.

Welcome to this week's Black Arrow Cyber Tip Tuesday, this week Tony talks about the CIA, or AIC, triad

What is the CIA triad, or AIC triad to distinguish it from one of the US intelligence agencies?

C, I & A relate to Confidentiality, Integrity and Availability.

Confidentiality is the protection of IT assets and data from unauthorised users. Integrity is ensuring that data is accurate, able to be relied upon and has not been changed or modified in an unauthorised manner and availability is ensuring that IT assets, data and networks are available to authorised users when they need it to be.

A loss of any one of these could be catastrophic to your business so you need to make sure you have appropriate controls in place to protect and if necessary recover from any problems.

Talk to us to see how we can help you.

Read More
Black Arrow Admin Black Arrow Admin

Information Security vs Cyber Security - what's the difference?

Welcome to this week's Tip Tuesday, this week Bruce explains the difference between Information Security and Cyber Security. The two terms are often used interchangeably, and in many situations that is ok, but the difference is important when you are looking at controls to reduce your risk. Information Security is the larger topic of keeping all your information secure.

Welcome to this week's Tip Tuesday, this week Bruce explains the difference between Information Security and Cyber Security.

The two terms are often used interchangeably, and in many situations that is ok, but the difference is important when you are looking at controls to reduce your risk.

Information Security is the larger topic of keeping all your information secure.

This includes things like a clear desk policy to ensure confidential papers are not left on your desk overnight, or ensuring employees don't read confidential documents on a train with other passengers, or worse still throwing away documents in a public bin when instead they should be shredded.

Cyber Security is the subsection of Information Security that refers to being connected to the Internet and online systems.

It includes storing documents on your computer or cloud server, or sending documents by email, or accessing online payments systems.

All these require strong controls to prevent unauthorised access.

Your objective is to protect the confidentiality, integrity and the availability of the information.

Contact us to talk about the controls you can put in place for your Cyber Security and wider Information Security.

Read More