Blog
CSAM-Use Strong Passwords & a Password Manager
October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...
Cybersecurity Awareness Month-October 2024
Cybersecurity Awareness Month is dedicated to raise awareness about the importance of cybersecurity. Celebrated every October, this initiative will be celebrating it's 21st...
Automated Moving Target Defense (AMTD)
The static nature of most systems provide attackers with an advantage for finding vulnerabilities and launching attacks. To counter this threat, emerging technologies...
IAM I Said
A good cybersecurity posture includes controlling access to assets. There are 2 approaches that are common and can be used together. It's important...
Managing Change Management
Change is hard. Change means work. But sometimes, as in the case of IT, change is necessary. Change management assists in planning and...
Best Practices in Media Storage and Destruction
Most organizations collect, maintain and store massive amounts of sensitive and personal data. Understanding regulations surrounding this data is crucial to protecting it...
NIST CSF Gets a Facelift!
Introducing the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) version 2.0. Nationally recognized as a cybersecurity framework for institutions to align with, the upgrades include some forward thinking improvements. The sets of controls are focused on risk management.
Bots-Friend or Foe?
What is a 'bot'? This refers to a software application that is programmed to perform specific tasks and can do this with or...
Controlling the Keys
Your environment has valuables within the data you keep. Managing the access to this sensitive data is crucial to an organization's security. Core...
Cybersecurity Needs YOU!
The cybersecurity industry has been suffering a critical shortage of talent for quite some time. It is reported that there is a...
Another Day, Another Data Breach
Yes indeed. I have been involved in multiple data compromises; Target, Home Depot, Retirement system, Equifax, Blue Cross/Blue Shield are ones I can...
Comparing MFA Methods: Which One Fits Your Security Needs?
Multi-factor and 2 factor authentication methods were introduced as an additional security measure to protect a user's login. A user will typically...
Vacation Dreams to Nightmare? Stay Safe!
Online booking platforms have become popular for travelers seeking vacation deals for accommodations, flights and car rentals. It's important to recognize that this...
Building Cyber Resilience
Cyber threats are an everyday menace for organizations. It requires significant investments and resources to safeguard the environment; protecting assets, data and people....
The Human Firewall
Cybersecurity fortification goes beyond the hardware and tools. Building a positive, defensive culture within the organization is a vital part of an overall...
Encrypting Files for Evil
Data encryption is important in helping protect confidentiality and integrity of the data. This form of cryptography will take plaintext and transform it...
Oops! Your Passwords Are Showing
Passwords are important to keep accounts private and secure. Keep in mind that you should follow security best practices when using passwords.
Behind the Square
Quick Response (QR) codes have become common place in advertising and communication. Once requiring a special QR code reader, these codes can easily...
Ethical Use of Personal Attributes in AI Technology
Artificial Intelligence collects data from multiple resources in order to create new content. Some of the data may be collected without informed consent....
Verizon 2024 Data Breach Investigation Report
Verizon's annual Data Breach Investigation Report (DBIR) is out! Now in its seventeenth year, the Verizon DBIR is trusted and respected in cybersecurity...