<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Benjamin Tetteh</title>
    <description>The latest articles on DEV Community by Benjamin Tetteh (@benjamin_tetteh).</description>
    <link>https://dev.to/benjamin_tetteh</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2923117%2F6ac8eea2-f58d-4fe0-aa54-21f5ae479dd8.png</url>
      <title>DEV Community: Benjamin Tetteh</title>
      <link>https://dev.to/benjamin_tetteh</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/benjamin_tetteh"/>
    <language>en</language>
    <item>
      <title>Enhancing Cybersecurity in Healthcare: A NIST Cybersecurity Framework Assessment</title>
      <dc:creator>Benjamin Tetteh</dc:creator>
      <pubDate>Sat, 08 Mar 2025 19:10:57 +0000</pubDate>
      <link>https://dev.to/benjamin_tetteh/enhancing-cybersecurity-in-healthcare-a-nist-cybersecurity-framework-assessment-23kd</link>
      <guid>https://dev.to/benjamin_tetteh/enhancing-cybersecurity-in-healthcare-a-nist-cybersecurity-framework-assessment-23kd</guid>
      <description>&lt;p&gt;Cybersecurity threats are an ever-growing concern, especially in industries handling sensitive data like healthcare. To address these risks, I conducted a NIST Cybersecurity Framework (CSF) Assessment for a fictional mid-sized healthcare provider, MediHealth Solutions Inc., as part of my cybersecurity portfolio.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Project Overview&lt;/strong&gt;&lt;br&gt;
The goal of this assessment was to evaluate MediHealth’s security posture, identify vulnerabilities, and recommend remediation strategies in alignment with NIST CSF and HIPAA requirements. The assessment covered key cybersecurity domains, including identifying assets, implementing protective measures, detecting threats, responding to incidents, and ensuring recovery.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Findings&lt;/strong&gt;&lt;br&gt;
One of the major findings was the presence of legacy system risks. The organization relied on an outdated Electronic Health Records (EHR) system, increasing its exposure to unpatched vulnerabilities. To mitigate this risk, I recommended system upgrades and the deployment of automated patch management. Another critical issue was human factors in cybersecurity. A phishing simulation revealed that 30% of employees fell for phishing attempts, highlighting the need for increased awareness. I proposed a cybersecurity training program using platforms like KnowBe4 and GoPhish to educate employees on recognizing and avoiding phishing attacks.&lt;/p&gt;

&lt;p&gt;Additionally, I identified the absence of an Incident Response Plan (IRP) to handle ransomware and data breaches. Without a structured IRP, the organization risked delayed responses to security incidents. To address this, I developed a comprehensive IRP based on NIST SP 800-61 Rev. 2, outlining clear response procedures and implementing quarterly tabletop exercises to ensure readiness. Weak access controls were another major concern, as critical systems lacked Multi-Factor Authentication (MFA) and Role-Based Access Controls (RBAC). Enforcing MFA for all high-risk accounts and restricting access based on user roles significantly improved the security posture. Furthermore, the lack of centralized monitoring meant that the organization had no Security Information and Event Management (SIEM) system to detect and analyze threats in real-time. To remedy this, I recommended deploying SIEM tools such as Splunk or ELK Stack, along with Intrusion Detection Systems (IDS/IPS) to enhance threat detection and mitigation capabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Relevance to My Cybersecurity Journey&lt;/strong&gt;&lt;br&gt;
As a self-motivated cybersecurity enthusiast, this project was instrumental in refining my skills in risk assessment, incident response, compliance, and security control implementation. Conducting this assessment independently showcased my ability to analyze real-world cybersecurity threats, design security solutions, and align them with industry standards. This hands-on experience reinforced my understanding of security governance, risk management, and compliance (GRC), which are crucial skills for cybersecurity professionals. It also highlights my capability to work autonomously, proactively learn, and apply best practices in enterprise security.&lt;/p&gt;

&lt;p&gt;This project provided invaluable experience in conducting enterprise-wide cybersecurity assessments, aligning security controls with compliance frameworks, and implementing actionable security improvements. It reinforced the importance of a structured approach to risk management, proactive threat detection, and continuous cybersecurity awareness training. Cybersecurity is a constantly evolving field that requires a mix of technical expertise and risk-based decision-making. This NIST assessment has been a valuable addition to my cybersecurity portfolio, demonstrating my ability to analyze security gaps and implement industry-standard security measures.&lt;/p&gt;

&lt;p&gt;📌 Check out the full assessment &lt;a href="https://github.com/BenjaminTetteh/Cybersecurity-Portfolio/blob/main/Enterprise-wide%20NIST%20cybersecurity%20framework%20assessment.pdf" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;💬 Let’s discuss! Have you worked with the NIST Cybersecurity Framework before? How do you approach security risk assessments in your projects?&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>governance</category>
      <category>infosec</category>
      <category>compliance</category>
    </item>
    <item>
      <title>From Data Breach to Insight: Exploring the Intersection of Cybersecurity and Communication</title>
      <dc:creator>Benjamin Tetteh</dc:creator>
      <pubDate>Sat, 08 Mar 2025 18:22:00 +0000</pubDate>
      <link>https://dev.to/benjamin_tetteh/from-data-breach-to-insight-exploring-the-intersection-of-cybersecurity-and-communication-1f3b</link>
      <guid>https://dev.to/benjamin_tetteh/from-data-breach-to-insight-exploring-the-intersection-of-cybersecurity-and-communication-1f3b</guid>
      <description>&lt;p&gt;I recently received an email notifying me of a data breach at a major public service provider in London that I rely on. Before this, I never truly considered that I could be directly impacted by a breach, even though they’re frequently reported in the media. With incidents like these becoming increasingly common, it was unsettling to think that my personal data may have been compromised. However, the service provider has been proactive, sending follow-up emails in the weeks following the initial notification, outlining the incident and their remediation efforts. As a communications professional, I found their response reassuring.&lt;/p&gt;

&lt;p&gt;Data breaches are becoming so frequent that they’re starting to feel like notifications from my telecom provider—constant, annoying, and impossible to ignore.&lt;/p&gt;

&lt;p&gt;Coincidentally, I’d been enrolled in the Google Cybersecurity Certificate course. My initial foray into cybersecurity was driven by the assumption that I would be diving into a highly technical world—one filled with firewalls, encryption, and endless lines of code, likely while wearing a hoodie in a dark room. While I certainly encountered that (minus the hoodie), what piqued my interest was discovering how crucial communication is within the cybersecurity landscape.&lt;/p&gt;

&lt;p&gt;In today's hyper-connected world, cybersecurity has become one of the most critical aspects of every organization's operational strategy. It’s not just about protecting sensitive data or ensuring business continuity; it’s also about building and maintaining trust with customers. I’ve come to realize that cybersecurity is more than just a technical responsibility; it’s also a communications challenge.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Intersection&lt;/strong&gt;&lt;br&gt;
Why? Because no matter how sophisticated an organization's defenses are, human error remains one of the most significant risks. This is where effective communication plays a pivotal role. While studying incident response plans, I realized that when a data breach occurs, it’s not just the IT team scrambling behind the scenes to secure systems and data. The communications team is equally essential in ensuring that stakeholders—whether customers, employees, or partners—are informed and reassured. Organizations are legally obligated to disclose breaches, and the quality, clarity, and timeliness of that communication often determine whether trust is preserved or lost. Cybersecurity professionals may patch vulnerabilities and mitigate future risks, but without clear, strategic communication, even the best technical response can leave people in the dark and cause unnecessary panic.&lt;/p&gt;

&lt;p&gt;One of the most critical elements of cybersecurity is awareness. Many threats—from phishing to social engineering—target the weakest link: people. Ensuring that employees and stakeholders understand the risks and how to avoid them requires more than a one-time memo or a check-the-box training module. It requires consistent, clear, and engaging communication. By translating complex technical concepts into easily understandable information, communicators can help create a culture of security. This extends to everything from regular awareness campaigns to engaging content that demystifies topics like password security, device protection, and data privacy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gaining Technical Expertise: The Next Frontier&lt;/strong&gt;&lt;br&gt;
On the flip side, my experience with the technical aspects of cybersecurity has also been eye-opening. Through the Google Cybersecurity Certificate, I’ve gained hands-on experience with tools like Python, Linux, and SQL, and I’ve worked with Security Information and Event Management (SIEM) tools to identify risks and mitigate threats. Understanding these technologies has allowed me to better appreciate the technical side of cybersecurity.&lt;/p&gt;

&lt;p&gt;My observations and learnings from the past weeks have made me appreciate the relationship between cybersecurity and communications. Both disciplines require a keen understanding of risk, an ability to anticipate and mitigate problems, and a focus on protecting people—whether through securing data or ensuring that information is clear and accessible. As I continue to explore both fields, I’m excited by the possibilities that lie at this intersection.&lt;/p&gt;

&lt;p&gt;On to the next.&lt;/p&gt;

&lt;p&gt;PS: I first published this article on my LinkedIn profile on 16/9/24.&lt;/p&gt;

</description>
      <category>security</category>
      <category>awareness</category>
      <category>beginners</category>
      <category>learning</category>
    </item>
  </channel>
</rss>
