Two-factor/multi-factor authentication graphic

IAM I Said

A good cybersecurity posture includes controlling access to assets. There are 2 approaches that are common and can be used together. It's important...

Cybersecurity graphic

Managing Change Management

Change is hard. Change means work. But sometimes, as in the case of IT, change is necessary. Change management assists in planning and...

Tools and resources small banner

Best Practices in Media Storage and Destruction

Most organizations collect, maintain and store massive amounts of sensitive and personal data. Understanding regulations surrounding this data is crucial to protecting it...

Cybersecurity graphic

NIST CSF Gets a Facelift!

Introducing the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) version 2.0. Nationally recognized as a cybersecurity framework for institutions to align with, the upgrades include some forward thinking improvements. The sets of controls are focused on risk management.

Virus cybersecurity banner

Bots-Friend or Foe?

What is a 'bot'? This refers to a software application that is programmed to perform specific tasks and can do this with or...

Remote work banner

Controlling the Keys

Your environment has valuables within the data you keep. Managing the access to this sensitive data is crucial to an organization's security. Core...

Cybersecurity graphic

Cybersecurity Needs YOU!

The cybersecurity industry has been suffering a critical shortage of talent for quite some time. It is reported that there is a...

Cyber crook graphic

Another Day, Another Data Breach

Yes indeed. I have been involved in multiple data compromises; Target, Home Depot, Retirement system, Equifax, Blue Cross/Blue Shield are ones I can...

Cybersecurity banner

Building Cyber Resilience

Cyber threats are an everyday menace for organizations. It requires significant investments and resources to safeguard the environment; protecting assets, data and people....

Kids online

The Human Firewall

Cybersecurity fortification goes beyond the hardware and tools. Building a positive, defensive culture within the organization is a vital part of an overall...

Ransomware graphic

Encrypting Files for Evil

Data encryption is important in helping protect confidentiality and integrity of the data. This form of cryptography will take plaintext and transform it...

Behind the Square

Quick Response (QR) codes have become common place in advertising and communication. Once requiring a special QR code reader, these codes can easily...

Membership banner - K-12

Choosing Your Cyber Attack Recovery Site

Having an area where recovery operations can function can sometimes be an important element in recuperation from a cybersecurity incident. There are 3...

Phishing graphic

Hook, Line and Sinker. Opening the Phishing Box.

Phishing-Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware....

Virus cybersecurity banner

Tech Support Scams

You are browsing websites, checking out the headlines, shopping or catching up on social media. Suddenly you are presented with a screen that...

Ransomware graphic

Honor Among Thieves

Is there such a thing? This phrase suggests that crooks trust each other. They will not steal from each other. When it comes...

Pi Hole DNS ad blaocking

How To Configure a Raspberry Pi as an Ad-Blocker

In this in-depth Pi Day project spotlight, I’ll walk you through the steps to turn a Raspberry Pi into an ad-blocking DNS server...

Artificial Intelligence and the Criminal Mind

The hype of artificial intelligence (AI) has caused excitement and fear. Various AI tools can be used to create audio, video, written content,...

Digital Crook

I Always Feel Like Somebody's Watching Me

That catchy tune by Rockwell is applicable in today's society. Social media and other online presences allow for Open Source Intelligence (OSINT)...

Cyber crook graphic

Why? Because I Said So!

Security is hard, right? So many restrictions! Passwords, MFA, content filtering, app restrictions, screen lock outs, etc. Why do I need to have...