{"id":19651,"date":"2022-07-21T09:10:09","date_gmt":"2022-07-21T17:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/07\/21\/news-13384\/"},"modified":"2022-07-21T09:10:09","modified_gmt":"2022-07-21T17:10:09","slug":"news-13384","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/07\/21\/news-13384\/","title":{"rendered":"The Winding Road to Compliance"},"content":{"rendered":"<p><strong>Credit to Author: Rob DeStefano| Date: Thu, 21 Jul 2022 16:24:14 +0000<\/strong><\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\n<div class=\"wp-container-1 wp-block-group\">\n<div class=\"wp-block-group__inner-container\">\n<p>\u201cHere are the keys. Buy milk and bread. Drive safely.\u201d<\/p>\n<p>These are important instructions for a new driver tasked with running an errand. But unless the driver knows where they are going, a bit of guidance on how to get to the store can only help. Without it, the driver may complete the errand successfully, or at least make a good effort; but they might not complete the errand or be inefficient in the attempt.<\/p>\n<p>For IT and security teams, aiming for compliance feels eerily similar to running errands without<br \/>direction. <\/p>\n<p>Like the driver, these users want to accomplish the task at hand (in this case, regulatory<br \/>compliance) but are often stymied by the ambiguity or lack of direction on how to do so. Often,<br \/>compliance standards define the ultimate objectives, but give organizations the flexibility to determine<br \/>for themselves the path they take to get there. <\/p>\n<p>Consequently, some users experience the equivalent of making three left turns when they didn\u2019t know they could have just made a right.<\/p>\n<h2>Navigating by the stars<\/h2>\n<p>Freedom to define your own path has some benefits, of course. So, how do you reach the goal<br \/>efficiently to optimally protect your organization against breaches? <\/p>\n<p>If you\u2019re working through this question, you\u2019re not alone. In fact, data from earlier this year suggests more <a href=\"https:\/\/www.cybersecuritydive.com\/spons\/cybersecurity-quarterly-benchmarks-q1-2022\/622971\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cybersecurity decision-makers are focused on ensuring governance and compliance standards are met (56%)<\/a>, topping the list of priority projects during the first quarter of 2022.<\/p>\n<p>It\u2019s no secret that complying with leading standards in your industry protects your business in several<br \/>ways \u2013 some more obvious than others. <\/p>\n<p>Immediately, there is the imperative protection for corporate data, personally identifiable information (PII), intellectual property, etc., and mandatory compliance with these protections to operate in certain industries or countries. Then there are the expanded values gained from compliance, such as assurances you can provide to executives and Boards about the organization\u2019s cybersecurity posture, or your improved stance for cyber insurance. <\/p>\n<p>Overriding all of these benefits is the primary reason compliance programs exist: to increase organizations\u2019 level of prevention against an attack (akin to the \u201cdrive safely\u201d instruction to a new driver).<\/p>\n<h2>Help along the journey<\/h2>\n<p>With the freedom to choose how you meet compliance requirements, a navigator who is easy to travel<br \/>with and able to help guide you efficiently can be the best kind of travel companion. You need a solution<br \/>partner who can help you check off some of those distance-markers along the compliance highway.<\/p>\n<p>Malwarebytes EDR includes essential threat prevention capabilities to keep nefarious actors from<br \/>entering your environment. <\/p>\n<p>These are complimented by threat detection and remediation tools to help you identify threats that get past the gate, so your IT or security team can respond effectively and efficiently. The platform aligns nicely with NIST and ENISA attack response frameworks, which include guidelines for best practices that help you achieve compliance.<\/p>\n<p>Compliance may not be the pinnacle of your journey, either; perhaps your organization\u2019s focus is<br \/>reinforcing specific attack surfaces. In cases like these, the value of an expandable, cloud-based platform becomes apparent.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes EDR<\/a> is built to run in our Nebula cloud platform, which empowers you to easily add<br \/>modules that fortify specific vectors. For example, adding our<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\"> Vulnerability Assessment and Patch<br \/>Management (VPM<\/a>) modules to your Malwarebytes EDR deployment helps protect against software exploits. <\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/business\/dns-filtering\">Connecting our DNS Filtering<\/a> module yields greater control over internet browsing and content<br \/>access, providing end users a safer, more secure web experience. In addition to their inherent enhanced<br \/>protection value, these modules help businesses with specific HIPAA, PCI and GDPR compliance criteria,<br \/>and public sector entities meet <a href=\"https:\/\/www.malwarebytes.com\/resources\/casestudies\/government\/easset_upload_file61795_216451_e.pdf\">additional requirements of CJIS compliance<\/a>, for example.<\/p>\n<\/p><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<h2>Drive safely!<\/h2>\n<p>The path to compliance is easier with an informed companion. Malwarebytes EDR helps you navigate<br \/>the compliance highways and byways, like a travel companion with experience in and expert knowledge<br \/>of the routes to optimal protection. Our platform is easy to learn and use and can effectively help you<br \/>reach your compliance destination (and beyond). <a href=\"https:\/\/www.malwarebytes.com\/business\/request_trial?ref=epr\">Get started with an EDR demo or trial today.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/the-winding-road-to-compliance\/\">The Winding Road to Compliance<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/the-winding-road-to-compliance\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Rob DeStefano| Date: Thu, 21 Jul 2022 16:24:14 +0000<\/strong><\/p>\n<p>Governance, risk, and compliance (GRC) are top-of-mind for many cybersecurity decision-makers. Learn why GRC is important &#8211; and how it make it easier.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/the-winding-road-to-compliance\/\">The Winding Road to Compliance<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,12534,26388,14971,14326,27046],"class_list":["post-19651","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-compliance","tag-dns-filtering","tag-edr","tag-governance","tag-vpm"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19651"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19651\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19651"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}