-
amonas
AskWoody LoungerThe paper doesn’t include such items as either
- how to hire a consultant or
- better abstract advice to consultants
There are way better resources such as Alex Field’s ITpromentor guides for the SMB market.
We need actionable tools and recommendations not abstracts for the intended market.
There is the managerial part and the technical part.For the technical part there is of course better and more targeted material out there.
I think the RTF is a managerial document. For managers and desicion makers. Not for the lower levels in the cybersecurity sector. Whenever i see refers to CIA (Confidentiality, Integrity, Availability) i always expect an abstract paper.
BUT i still believe that we need more papers like that. Cybersecurity must start from the C-levels of the organization and not from below.Cut them some slack 🙂
“We need actionable tools and recommendations not abstracts for the intended market.”
No we need to convince the management that cyberthreat is out there. And maybe in cybersecurity the ROI (Return of Investment) cannot be directly calculated BUT there is the (Return of NOT Investment) in case measures are not taken. After they realize that, we can talk about professionals, hiring and consulting.
-
amonas
AskWoody LoungerBy 2023, insurer groups must add clauses to cyber policies excluding state-backed hacks that severely affect target nation’s infrastructure, insurance marketplace says
Lloyd’s of London Ltd. will require its insurer groups globally to exclude catastrophic state-backed hacks from stand-alone cyber insurance policies starting next year.
Lloyd’s is a marketplace where roughly 75 syndicates of underwriters congregate to provide insurance coverage for businesses, organizations and individuals. As of March 31, when coverage begins or is renewed, syndicates must exclude state-backed cyberattacks from policies that protect against physical and digital damage caused by hacks, Underwriting Director Tony Chaudhry said in a bulletin dated Aug. 16.
The move is designed to make sure insurers are clearly stating what they will and won’t cover, as the ability of state-backed hacks to spread and cause damage could cause systemic risk in the insurance market, the notice said…
* Let the IT managers pay for damages.
state-backed cyberattacks or speculated state-backed cyberattacks? Is a suspicion good enough to back up a claim like that? With the accused country (of course denying it) who is responsible and accurate enough to say that the attack was backed by the X state? Would that be the pure truth? setting factors like propaganda or other financial reasons aside?
I would love to see this move in action.
-
amonas
AskWoody LoungerHello,
“It is not intended to serve as an implementation guide, but rather a recommendation of defensive actions that can be taken…”
As it is already stated is a recomendation and it is supposed to be abstract. The purpose of the paper is not to cover fully all possible scenarios \ infrastructures \ installations \ environments.Noone can do that for you…
If you get to know your environment then you will know how much space you need for your audit logs and which logs should you eventually keep or look for. There are other product \ role specific guides available that will tell you which events should you look for in AD etc
There is no one-guide-do-it-all available.Even Certification Material are not that stretched.
That’s why i find your comments (“Many of the items listed are a bit vague or are not stressed enough for small to medium businesses to take action. “) a little bit inacurate.
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Very Quarrelsome Taskbar!
by
CWBillow
46 minutes ago -
Move OneNote Notebook OFF OneDrive and make it local
by
CWBillow
3 hours, 30 minutes ago -
Microsoft 365 to block file access via legacy auth protocols by default
by
Alex5723
4 hours, 48 minutes ago -
Is your battery draining?
by
Susan Bradley
17 minutes ago -
The 16-billion-record data breach that no one’s ever heard of
by
Alex5723
6 hours, 46 minutes ago -
Weasel Words Rule Too Many Data Breach Notifications
by
Nibbled To Death By Ducks
7 hours, 22 minutes ago -
Windows Command Prompt and Powershell will not open as Administrator
by
Gordski
10 hours, 37 minutes ago -
Intel Management Engine (Intel ME) Security Issue
by
PL1
1 hour, 20 minutes ago -
Old Geek Forced to Update. Buy a Win 11 PC? Yikes! How do I cope?
by
RonE22
3 hours, 51 minutes ago -
National scam day
by
Susan Bradley
6 hours, 47 minutes ago -
macOS Tahoe 26 the end of the road for Intel Macs, OCLP, Hackintosh
by
Alex5723
4 hours, 2 minutes ago -
Cyberattack on some Washington Post journalists’ email accounts
by
Bob99
1 day, 8 hours ago -
Tools to support internet discussions
by
Kathy Stevens
1 day, 15 hours ago -
How get Group Policy to allow specific Driver to download?
by
Tex265
23 hours, 31 minutes ago -
AI is good sometimes
by
Susan Bradley
1 day, 15 hours ago -
Mozilla quietly tests Perplexity AI as a New Firefox Search Option
by
Alex5723
1 day, 5 hours ago -
Perplexity Pro free for 12 mos for Samsung Galaxy phones
by
Patricia Grace
2 days, 15 hours ago -
June KB5060842 update broke DHCP server service
by
Alex5723
2 days, 14 hours ago -
AMD Ryzen™ Chipset Driver Release Notes 7.06.02.123
by
Alex5723
2 days, 18 hours ago -
Excessive security alerts
by
WSSebastian42
1 day, 9 hours ago -
* CrystalDiskMark may shorten SSD/USB Memory life
by
Alex5723
3 days, 3 hours ago -
Ben’s excellent adventure with Linux
by
Ben Myers
1 hour, 12 minutes ago -
Seconds are back in Windows 10!
by
Susan Bradley
2 days, 15 hours ago -
WebBrowserPassView — Take inventory of your stored passwords
by
Deanna McElveen
1 day, 8 hours ago -
OS news from WWDC 2025
by
Will Fastie
18 hours, 49 minutes ago -
Need help with graphics…
by
WSBatBytes
1 day, 23 hours ago -
AMD : Out of Bounds (OOB) read vulnerability in TPM 2.0 CVE-2025-2884
by
Alex5723
3 days, 19 hours ago -
Totally remove or disable BitLocker
by
CWBillow
2 days, 18 hours ago -
Windows 10 gets 6 years of ESU?
by
n0ads
2 days, 21 hours ago -
Apple, Google stores still offer China-based VPNs, report says
by
Nibbled To Death By Ducks
4 days, 6 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.