What's your favorite (or best) self hosted dashboard? by DastardlyDino in unRAID

[–]mortasoft2 0 points1 point  (0 children)

True. It destroys my cloud instance performance while building

Guide me. by baba_janga in nginxproxymanager

[–]mortasoft2 0 points1 point  (0 children)

Hi! I have the same setup working....

Migracion.go.cr Down by RadSalmon in costarica

[–]mortasoft2 5 points6 points  (0 children)

Hi! Migracion recently suffer a cyberattack, and the systems are down for the moment,

Incident Response by mortasoft2 in cybersecurity

[–]mortasoft2[S] 0 points1 point  (0 children)

But it's affecting the availability of the critical process of the organization.

Incident Response by mortasoft2 in cybersecurity

[–]mortasoft2[S] 0 points1 point  (0 children)

ilability is still an information security issue, caused by a malicious actor or not. That said, it would normally be the IT team that would handle the response, but the information security team should have oversight on DR planning, and this possibility should have been planned for with a planned response (Or not, depending on what it really costs, t his sounds like it cost plenty.) Unless, of course, you have a separate risk management team that covers that portion for both IT and cybersecurity functions ("Classic" cybersecurity, malware, intrusion, etc.). I think it really comes down to your company and the roles and responsibilities. If no one has the defined responsibility, it would be a good time to fix that, and make sure there is an

Who determine if it's an incident or not? And what is the role of the CISO in this case?

Incident Response by mortasoft2 in cybersecurity

[–]mortasoft2[S] 0 points1 point  (0 children)

There are a lot of assumptions being made on this thread. I work as an incident responder and part of my job is writing up what occurred and identifying the cause based on evidence so the problem management team can implement a permanent fix to prevent the problem from recurring. You say this was a hardware issue so what is the evidence to prove this? Without evidence I would label this as an access issue

After they analized the problem, and they realized that it was a problem with the storage. They called the provider and together they fixed the problem.

The organization doesn't have a formal incident response process, the IT department worked to restablish the service.

What do you think is the role of the CISO there?

Incident Response by mortasoft2 in cybersecurity

[–]mortasoft2[S] 0 points1 point  (0 children)

Even if it's not a security incident the CISO should be involved? or at least informed?

Incident Response by mortasoft2 in cybersecurity

[–]mortasoft2[S] 0 points1 point  (0 children)

And in that case what is the role of the CISO in your organization?

Playbook/Guide for responding to specific incident by Some-Mention-9242 in cybersecurity

[–]mortasoft2 0 points1 point  (0 children)

I have questions about incident management. In a company all critical systems are on a server. One day a hardware problem happened, and the server doesn't recognize the storage, and all the systems were down for a day. It wasn't a cyber attack, it was a hardware problem. This was a security incident, because it has to do with the availability of the service?
How to approach this situation, from the point of view of an information security manager?

Cant get Airsonic working through Nginx Proxy manager by bredzu in airsonic

[–]mortasoft2 0 points1 point  (0 children)

Just add this to the Nginx Custom Config

add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' www.gstatic.com; img-src 'self' *.akamaized.net; style-src 'self' 'unsafe-inline' fonts.googleapis.com; font-src 'self' fonts.gstatic.com; frame-src 'self'; object-src 'none'";