A Simple Guide to the Updated NIST 2.0 Cybersecurity Framework

Tanya Wetson-Catt • 8 July 2024

Staying ahead of threats is a challenge for organisations of all sizes. Reported global security incidents grew between February and March of 2024. They increased by 69.8%.


It’s important to use a structured approach to cybersecurity. This helps to protect your organisation.


The National Institute of Standards and Technology (NIST) created a Cybersecurity Framework (CSF). It provides an industry-agnostic approach to security. It's designed to help companies manage and reduce their cybersecurity risks. The framework was recently updated in 2024 to NIST CSF 2.0.


CSF 2.0 is a comprehensive update that builds upon the success of its predecessor. It offers a more streamlined and flexible approach to cybersecurity. This guide aims to simplify the framework as well as make it more easily accessible to small and large businesses alike.


Understanding the Core of NIST CSF 2.0


At the heart of CSF 2.0 is the Core. The Core consists of five concurrent and continuous Functions. These are: Identify, Protect, Detect, Respond, and Recover. These Functions provide a high-level strategic view of cybersecurity risk as well as an organisation's management of that risk. This allows for a dynamic approach to addressing threats.


Here are the five Core Functions of NIST CSF 2.0.


1. Identify


This function involves identifying and understanding the organisation's assets, cyber risks, and vulnerabilities. It's essential to have a clear understanding of what you need to protect. You need this before you can install safeguards.


2. Protect


The protect function focuses on implementing safeguards. These protections are to deter, detect, and mitigate cybersecurity risks. This includes measures such as firewalls, intrusion detection systems, and data encryption.


3. Detect


Early detection of cybersecurity incidents is critical for minimising damage. The detect function emphasises the importance of detection as well as having mechanisms to identify and report suspicious activity.


4.Respond


The respond function outlines the steps to take in the event of a cybersecurity incident. This includes activities such as containment, eradication, recovery, and lessons learned.


5.Recover


The recover function focuses on restoring normal operations after a cybersecurity incident. This includes activities such as data restoration, system recovery, and business continuity planning.


Profiles and Tiers: Tailoring the Framework


The updated framework introduces the concept of Profiles and Tiers. These help organisations tailor their cybersecurity practices. They can customise them to their specific needs, risk tolerances, and resources.


Profiles


Profiles are the alignment of the Functions, Categories, and Subcategories. They're aligned with the business requirements, risk tolerance, and resources of the organisation.


Tiers


Tiers provide context on how an organisation views cybersecurity risk. As well as the processes in place to manage that risk. They range from Partial (Tier 1) to Adaptive (Tier 4).


Benefits of Using NIST CSF 2.0


There are many benefits to using NIST CSF 2.0, including:


  • Improved Cybersecurity Posture: By following the guidance in NIST CSF 2.0, organisations can develop a more comprehensive and effective cybersecurity program.
  • Reduced Risk of Cyberattacks: The framework helps organisations identify and mitigate cybersecurity risks. This can help to reduce the likelihood of cyberattacks.
  • Enhanced Compliance: NIST aligned CSF 2.0 with many industry standards and regulations. This can help organisations to meet compliance requirements.
  • Improved Communication: The framework provides a common language for communicating about cybersecurity risks. This can help to improve communication between different parts of an organisation.


Cost Savings: NIST CSF 2.0 can help organisations save money. It does this by preventing cyberattacks and reducing the impact of incidents. 


Getting Started with NIST CSF 2.0


If you are interested in getting started with NIST CSF 2.0, there are a few things you can do:


  • Familiarise yourself with the framework: Take some time to read through the NIST CSF 2.0 publication. Familiarise yourself with the Core Functions and categories.
  • Assess your current cybersecurity posture: Conduct an assessment of your current cybersecurity posture. This will help you identify any gaps or weaknesses.
  • Develop a cybersecurity plan: Based on your assessment, develop a cybersecurity plan. It should outline how you will put in place the NIST CSF 2.0 framework in your organisation.
  • Seek professional help: Need help getting started with NIST CSF 2.0? Seek out a managed IT services partner. We’ll offer guidance and support.

By following these steps, you can begin to deploy NIST CSF 2.0 in your organisation. At the same time, you'll be improving your cybersecurity posture.


Schedule a Cybersecurity Assessment Today


The NIST CSF 2.0 is a valuable tool. It can help organisations of all sizes manage and reduce their cybersecurity risks. Follow the guidance in the framework. It will help you develop a more comprehensive and effective cybersecurity program.


Are you looking to improve your organisation's cybersecurity posture? NIST CSF 2.0 is a great place to start. We can help you get started with a cybersecurity assessment. We’ll identify assets that need protecting and security risks in your network. We can then work with you on a budget-friendly plan.



Contact us today to schedule a cybersecurity assessment.

Let's Talk Tech

More from our blog

by Tanya Wetson-Catt 2 May 2025
In this digital world, it's hard to keep track of all the storage space on your devices. It's easy for our devices to run out of room because we keep adding more photos, videos, documents, and files. Cloud storage is a convenient option because it lets people store their data online, which frees up space on their devices and lets them view files from anywhere. This post will talk about the best cloud storage services that can help you get more done online and save space on your devices. What Are Cloud Storage Providers? Cloud storage services let people store and control their data online. These are called c loud storage providers . There are many perks to using these services, such as more storage space, the ability to share files, and better security. People who use cloud storage can get to their files from any internet-connected device. This makes it easier for people to work together and from home. Cloud storage is important for people who want to free up room on their devices and keep their data safe and easy to access. There are different cloud storage companies with different features, prices, and ways to use their services. Some providers focus on personal use and offer free storage with the choice to pay more for more space. Others are geared toward businesses and offer advanced tools for working together and lots of storage space. It's important to know the differences between these service providers so you can pick the right one for your needs. Recently, cloud storage has grown into more than just a place to store files. It's now also a way to work together and get things done. A lot of service providers now offer office software and real-time tools for working together. This makes it easier for teams to work on projects and papers together. The move toward a more unified service model has made cloud storage an important tool for both personal and business use. Next, we’ll cover how cloud storage providers can help with productivity. How Do Cloud Storage Providers Help With Productivity? Cloud storage providers play a crucial role in enhancing digital workflow by offering a centralised platform for storing, accessing, and sharing files. This not only helps in freeing up device space but also facilitates collaboration and productivity. Here are some key ways cloud storage enhances digital workflow: Centralised File Management Cloud storage allows users to manage all their files from a single platform. This means you can access your documents, photos, and videos from any device with an internet connection, making it easier to work on projects or share files with others. Enhanced Collaboration Tools Many cloud storage providers offer integrated collaboration tools that enable real-time editing and commenting on documents. This feature is particularly useful for teams working on projects together, as it allows multiple users to contribute simultaneously without version control issues. Advanced Security Features Cloud storage providers typically offer robust security features, including encryption and two-factor authentication, to protect your data from unauthorised access. This ensures that your files are safe even if your device is compromised. Scalable Storage Options Cloud storage services often provide scalable storage options, allowing you to upgrade or downgrade your storage capacity as needed. This flexibility is beneficial for both individuals and businesses, as it ensures you only pay for the storage you use. The ability of cloud storage providers to enhance digital workflow makes them indispensable for anyone looking to streamline their file management and collaboration processes. In the next section, we’ll talk about the best cloud storage providers out there now. What Are the Best Cloud Storage Providers? Choosing the right cloud storage provider depends on your specific needs, whether you’re looking for personal use or business solutions. Here are some of the top cloud storage providers that offer a range of features and benefits: G oogle Drive : Known for its seamless integration with Google Docs and Sheets, Google Drive offers 15 GB of free storage and is ideal for those already using Google’s productivity suite. Microsoft OneDrive: Integrated with Microsoft Office, OneDrive provides a smooth experience for users of Word, Excel, and PowerPoint. It offers 5 GB of free storage and is particularly useful for Windows users. Dropbox: Famous for its file-sharing capabilities, Dropbox offers 2 GB of free storage and is popular among users who frequently collaborate on projects. iCloud: Designed for Apple users, iCloud provides 5 GB of free storage and integrates well with other Apple services like Photos and Mail. pCloud : Known for its lifetime subscription options, pCloud offers up to 10 GB of free storage and is a good choice for those looking for long-term storage solutions. Box: Focused on business users, Box offers robust security features and collaboration tools, making it ideal for enterprises. It's important to compare these providers based on your individual needs because each one has its own pros and cons. There is a cloud storage service out there that can meet your needs, whether you want free space, tools for working together, or more security. Take Control of Your Digital Space Cloud storage providers are a great way to manage the room on your devices and get more done online. You can make sure that your files are safe, easy to view, and share with others by picking the right provider . There's a cloud storage service out there for everyone, from individuals who want to free up room on their phones to businesses that need powerful tools for teamwork. To get personalised help choosing the best cloud storage provider for your needs, please don't hesitate to get in touch with us.
by Tanya Wetson-Catt 30 April 2025
Mobile applications have become an integral part of our lives. We use them to browse the internet, network, communicate, and much more. But they open us up to risks caused by fraudsters who may steal information or damage our phones. According to 2024 data from Asee, over 75% of published apps have at least one security vulnerability. This means that 3 out of every 4 your favourite apps could be risky to use. It’s important to be cautious while downloading and maintaining apps. Here are ten simple tips that can help keep your mobile apps secure. Why Is Mobile App Security Important? Not only do 75% of apps risk our security, but business apps are three times more likely to leak log-in information. These risks also include even the most popular apps. Those with over 5 million downloads still have at least one security flaw. Using mobile apps is not always safe. There are many ways for hackers and criminals to steal your data. This can happen because of your internet connection, app permissions, and more. Next, we’ll cover ten essential security tips to keep your data safe when using mobile apps. Top 10 Security Tips For Mobile App Users Mobile apps can be dangerous, but there are ways to reduce these risks. If you’re careful about where you download apps, the permissions you allow, the internet connection you use, and more, you can keep your data as safe as possible. Here are the top ten security tips for mobile app users: 1. Only download from official stores The first step of mobile app security is choosing safe apps. Some apps are not secure, even when they look legit. It’s important to be aware of the source before you click download. Always download your apps from the App Store or Google Play. These stores check apps to make sure they're safe. Don't download from random websites. They might have fake apps that can hurt your phone. 2. Check app ratings and reviews Before you download an app, see what other people are saying about it. If lots of people like it and say it's safe, it is probably fine . But if people are saying it has problems, perhaps you don't want to install it. 3. Read app permissions When you find an app you want to download, stop and do research first. If you download a fake app by mistake, your device may be attacked. It can open you up to malware, ransomware, and more threats. Apps frequently request permission to access certain parts of your phone. Maybe they want to know your location or use your camera. Consider whether they really need that information. If an app requests access to too much, do not install it. 4. Update your phone’s operating system Keep the software on your phone up to date. New updates frequently patch security vulnerabilities. This makes it more difficult for the bad guys to hack into your phone. 5. Use strong passwords We use apps for many day-to-day tasks like sending emails, storing files, and sharing on social media. If an app is hacked, your personal information can be stolen. Passwords protect your apps. Make sure your password is difficult to guess. Use letters, numbers, and symbols. Do not use the same password for all apps. That way, if a person guesses one password, he or she cannot access all your apps. 6. Enable two-factor authentication Two-factor authentication means an additional step in order to log in. It can send a code to your phone or email. This will make it way harder for bad people to get into your accounts. 7. Beware of public Wi-Fi Public Wi-Fi is never a safe space. There may be bad guys watching what you do online. Never use public Wi-Fi on important apps. Wait until you're on a safe network, like the apps for banking. 8. Log out of apps not in use Log out of apps whenever you're done using them. This is even more important when the apps hold personal information, such as banking or email apps. In case someone steals your phone, it's much harder for them to access your apps. 9. Update your apps Developers of applications usually fix security issues in updates. Keep updating your apps whenever newer versions get released. It will help in safeguarding your information. 10. Use security features Lots of apps have additional security features. These may include fingerprint locks or face recognition. Switch these on if you can, as they can help stop other people using your apps. Even with these security tips, it’s important to take other measures to protect your data. Be sure to follow our tips on safe downloads and data protection in addition. Stay Safe While Using Mobile Apps It's not hard to stay safe with mobile apps. Just be careful and think before you act. Only download apps you trust. Keep your phone and apps updated. Use strong passwords and extra security when you can.  Remember, safety is in your hands. Don’t hesitate to ask for help with app security. For more mobile app security tips, feel free to contact us today.
by Tanya Wetson-Catt 23 April 2025
Malware and ransomware are two types of bad software. They can damage your computer or steal your data. Downloading this harmful software comes with serious consequences. In 2024, there were more than 60 million new strains of malware found on the internet. This is why it’s critical to understand the difference between them. This article will help you understand both types of threats. What is Malware? Malware is a general term that means "malicious software." It includes many types of harmful programs. Depending on the type, malware can do different bad things to your computer. These are the four main types of malware: Viruses: These spread from one computer to another. Worms: They can copy themselves without your help. Trojans: They trick you into thinking they're good programs. Spyware: This type watches what you do on your computer. Malware can cause a lot of problems. If you get malware on your device, it can: Slow down your computer Delete your files Steal your personal info Use your computer to attack others What is Ransomware? Ransomware is a type of malware. It locks your files or your entire computer. Then it demands money to unlock them. It is a form of digital kidnapping of your data. Ransomware goes by a pretty basic pattern: It infects your computer, normally through an e-mail or download. It encrypts your files. This means it locks them with a secret code. It displays a message. The message requests money to decrypt your files. You may be provided with a key to unlock the files if you pay. In other cases, the attackers abscond with your money. As of 2024, the average ransom was $2.73 million . This is almost a $1 million increase from the previous year according to Sophos. There are primarily two types of ransomware: Locker ransomware: This locks the whole computer. Crypto ransomware: This only encrypts your files. How are Malware and Ransomware Different? The main difference between malware and ransomware is their goal. Malware wants to cause damage or steal info. Ransomware wants to get money from you directly. While malware wants to take your data, ransomware will lock your files and demand payment to unlock them. Their methods are also different. Malware works in secret and you may not know it’s there. Ransomware makes its presence known so the attackers can ask you for money. How Does It Get Onto Your Computer? Malware and ransomware can end up on your computer in many of the same ways. These include: Through email attachments Via phony websites Via a USB drive with an infection From using outdated software These are the most common methods, but new techniques are on the rise. Fileless malware was expected to grow 65% in 2024 , and AI-assisted malware may make up 20% of strains in 2025. If you get infected by malware or ransomware, it’s important to act quickly. You should know these signs of infection to protect yourself. For malware: Your computer is slow Strange pop-ups appear Programs crash often For ransomware: You can't open your files You see a ransom note on your screen Your desktop background changes to a warning How Can You Protect Yourself? You can take steps to stay safe from both malware and ransomware. First, here are some general safety tips for malware and ransomware: Keep your software up to date Use strong passwords Don't click on strange links or attachments Backup your files regularly For malware specifically, you can protect yourself by using anti-virus programs and being selective with what you download. To stay safe from ransomware, take offline backups of your files and use ransomware-specific protection tools. What to Do If You’re Attacked If you suspect that you have malware or ransomware, take action right away. For Malware: Go offline Run full anti-virus Delete infected files Change all your passwords For Ransomware: Go offline Don't pay the ransom (it may not work) Report the attack to the police Restore your files from a backup Why It Pays to Know the Difference Knowing the difference between malware and ransomware can help with better protection. This will help you respond in the best way when attacked. The more you know what you are against, the better your chance at taking the right steps to keep yourself safe. If you are under attack, knowing what type of threat it is helps you take quicker action. You can take proper steps towards rectifying the problem and keeping your data safe. Stay Safe in the Digital World The digital world can be hazardous. But you can keep safe if you’re careful. Keep in mind the differences between malware and ransomware, and practice good safety habits daily. And, if you are in need of help to keep yourself safe on the internet, never hesitate to ask for assistance.  For further information on protecting your digital life, contact us. We want to help keep you secure in the face of all types of cyber threats.