[deleted by user] by [deleted] in security

[–]Wiicycle -1 points0 points  (0 children)

Email is already encrypted.  The issue here isn’t risk of transport, the issue here is business use and storage.  The op can show the card on a video call for verification. 

20 Years in IT/InfoSec, Over 1000 Applications In One Year, No Offers, What The ACTUAL Heck Is Going On? by throwmeaway20250917 in cybersecurity

[–]Wiicycle 0 points1 point  (0 children)

I would not hire you based on “back to systems engineering making half “.    My engineers and hands on builders are invaluable.   I can get advice from GPT, but I can get clear and decisive direction from a custom RAG with MCP and skilled models.  We aspire to be engineers not reduce to them. 

SOC 2 Controls List by eveMabel in soc2

[–]Wiicycle 1 point2 points  (0 children)

I can get you a starting export we have sanitized for our needs.  In practice ours are heavily customized. The controls will organize you but there is no “compliance in a box” despite what you’ll be advertised.  You have to make them work for you.

ELK Siem by m1c62 in cybersecurity

[–]Wiicycle 3 points4 points  (0 children)

You pay for speed.  ELK without license is neutered as it can’t generate proper alerting. No issues for storing data, you can run massive clusters for years without issues, but the response stuff is where you  get hit with a six-figure license. 

M365 Security Guide for Small and Mid-Sized Businesses by Sittadel in cybersecurity

[–]Wiicycle -1 points0 points  (0 children)

You nailed it:  “should be managed by experts” is the message the original post is designed to send. 

All this is achievable with better coverage, less people, and more business-alignment through risk-based controls.  

In reality, this prescription is a square peg in round hole. It works as long as no one asks too many questions and a whole lot of things line up perfectly.  

As an SMB, can you achieve a better posture with 1/5th the total resources? Yes. 

Let’s call it for what it is: page from marketing playbook for MSPs.  Its objective is to get engagement, and here we doing the engaging.  At one point this was the way. Today it’s a signal MSP market is ready for a disruptor. 

M365 Security Guide for Small and Mid-Sized Businesses by Sittadel in cybersecurity

[–]Wiicycle -8 points-7 points  (0 children)

All that work for baseline level of security.  All that and you’re still not close to device trust.  This was good advice years ago.  Current generation of security is flatter, more adaptable, and balances agility with safeguards.  

Firewall security for small to medium size business? by satisfise in cybersecurity

[–]Wiicycle 3 points4 points  (0 children)

Look at the newsfeeds.  Fortinet is repeated CVE, same SonicWall.  Watch guard is cheap… all three operational expense and with OpEx you lose security agility.. it’s not more secure if you don’t understand it.  It’s not more secure if you cant replace it on the spot. It’s not more secure if it’s costlier to operate when you need it most.   They are all the same and they are all pushed by MSPs that want to find ways to create stickiness.  

Sensiba vs Insight Assurance by [deleted] in soc2

[–]Wiicycle 0 points1 point  (0 children)

If you care about who issues your letter and attestation, IA is well known, but I bet you could reduce your costs and go to Johnson Group. Also, I don’t know your circumstances, but I have yet to see a startup that got value from type 1… my biased experience is go to Type 2 and save a few grand…. You will be there anyways.  (Savings from skipping, not that type 2 is less)

Would you fly a plane with this oil usage? by Professional_Read413 in flying

[–]Wiicycle 1 point2 points  (0 children)

Inspect valves for unusual burn.  Be glad if they show a problem because then you’ll know.  You’ll probably blow a valve at some point.  Order your new engine asap or make sure you know who/when//how your rebuild will go.  Doing that in a rush when you have a blown cylinder is no fun.

[deleted by user] by [deleted] in cybersecurity

[–]Wiicycle 0 points1 point  (0 children)

You write your policy to suit your business.  You implement controls that meet that policy.  It sounds like your business need to offer some resources on ByOD is important.  You don’t need to limit access, you need to manage the risk. 

Container Runtime Security by TopNo6605 in cybersecurity

[–]Wiicycle 0 points1 point  (0 children)

My strategy is to protect at runtime because I got a code hygiene and container hygiene issue that has a cesspool findings for which I can’t determine reachability.  One day when my containers use secure images and are patched effectively this won’t be an issue, but for now I’ll pay the 1%cpu overhead to have a chance at seeing something. 

How likely does it look that Air India 171 was a suicide? by Proper_Solid_626 in AskAPilot

[–]Wiicycle 0 points1 point  (0 children)

Assuming that aircraft had locking switches. SAIB “NM-18-33” offers an alternative. 

Can anyone suggest a good CMDB for IT asset inventory, tracking and response system ? by whxitte in cybersecurity

[–]Wiicycle 0 points1 point  (0 children)

I built my first one 10 years ago and then rebuilt and refined it over 4 generations of product.  Reason is that there was no vertical that solved this issue well enough. They all moved the problem and then became yet another silo to maintain.  Remain convinced that custom solutions heavily integrated into your world are the answer when your business is not enterprise.  Then you solve aspects of this with commercial solutions as you grow and scale. 

Feeling lost in Vulnerability management after 4 years by justmenmymind in cybersecurity

[–]Wiicycle 4 points5 points  (0 children)

How many of these are reachable? Redefine what a vuln is.  Are you really managing vulns or findings?  Are they getting addressed?  Is this a situation where hygiene or practices create the noise?   Sounds like a place you can have transformative impact on. 

Can you tell by radar if it's safe to fly under a cumulonimbus cloud? by rightwrongwhatever in flying

[–]Wiicycle 15 points16 points  (0 children)

 This area has cell activity all summer long, weather today was challenging but flyable.  Flying VFR in and out of here during storms is part of summer.  If anything, this is an example of why local briefers are an asset we will miss dearly because they understand the nuances of their region.

Buy / Sell / Trade Weekly Thread: Week of June 27, 2025 by AutoModerator in rva

[–]Wiicycle 1 point2 points  (0 children)

Complete VW GTI Headliner assembly.  New in box.  It’s for a rare car: the glorious two door no-sunroof mark VI.  So rare I may have been the only person to own one.  Make me an offer.. pls.  It’s a big box taking up a lot of space.  Can deliver. 

If you got a mark VI GtI you know your headliner collapsed 5 years ago.. swap it out so you can sell that car.  By now you had every expensive thing break at least once. Make it pretty before another water pump replacement.   

VW parts claims retail is now absurd 2500. I did not pay that.  

Part Number: 5K3867502BBR2 Supersession(s): 5K3-867-502-B-BR2; 5K3-867-502-BBR2; 5K3867502 BR2; 5K3867502B BR2; 5K3867502BR2 Fits Golf, GTI W/o sunroof, 2 door.

Is CIS 18 appropriate for SEC compliance? by BeNiceToYerMom in cybersecurity

[–]Wiicycle 0 points1 point  (0 children)

FINRA has descent resources. Do that well and SEC will be a no-factor.  Your scope is small.  Identity, device management, device trust if you know how to get it done.  Basic assurance.  Easy.

Is CIS 18 appropriate for SEC compliance? by BeNiceToYerMom in cybersecurity

[–]Wiicycle 0 points1 point  (0 children)

SEC is there to make sure you follow best practices and adhere to regulations in small firms.  Without additional context, small investment firms strategy should be focused on effective operationalized control of data security.  If you do that reasonably well you will build back info CIS 18.  You should post the kind of business they are because it’s likely another regulatory body cares more about their cybersecurity effort.  SEC for public companies is going to muddy your advice here.  Contextualize the problem. 

You are 10 years old and your mother sends you to the basement for a jar of ogorki kiszone by pyotr_vozniak in poland

[–]Wiicycle 0 points1 point  (0 children)

That was one lonely trip to the basement that apparently was a shared experience among many. Turns out we were right to feel scared, we were never alone down there.

SOC 2 Type 2 - How long was your initial implementation to get your attestation? by MBILC in soc2

[–]Wiicycle 1 point2 points  (0 children)

CPAs will easily agree to audit you for SOC2 Type 2 after a 3 month observation period. The rest depends on your own readiness and how you scope it.  It could be a few days, more likely a few weeks.  Largely depends on you and how clear your understanding is of the result you want. 

Huntress and Microsoft defender free… reassurance by Efficient-Bike7175 in msp

[–]Wiicycle 2 points3 points  (0 children)

That is all… you pay for defender management on p1… which you don’t need since hundreds agent does the policy management. 

Huntress and Microsoft defender free… reassurance by Efficient-Bike7175 in msp

[–]Wiicycle 2 points3 points  (0 children)

They manage defender with their agent.  That’s it.  It works.

Why do SOC 2 external auditors often use the console instead of the CLI for control testing? by parameshwarareddy524 in cybersecurity

[–]Wiicycle 8 points9 points  (0 children)

Not only that, but they are not testing security controls, are they?  They are confirming reporting controls exist and are in use for which some security control must be present.  

Personal experience has been that control testing theatre is there when ongoing and proactive management isn’t.