Blog
Data Privacy Day - January 28, 2025: You Have the Power to Take Charge of Your Data
As more data is stored in the cloud or transferred to third parties, how can...
Incident Reporting: Your First Line of Defense
Organizations use layered security to prevent falling victim to a cybersecurity incident. The 3 main elements of layered security require administrative, physical and...
Ring in the New Year with a Cybersecurity Makeover
A new year brings new opportunities. What a great time to review your cybersecurity practices! Evaluate every aspect of your digital life. Check...
Caught in the Web: Common Cyber Crimes
Cyber crime is a broad term that can encompass a wide variety of malicious activity. These attacks can be aimed at networks, businesses...
Salt Typhoon Cyber Attack
The Salt Typhoon cyber attack, conducted by bad actors in China, targeted telecommunication organizations. Major telecom companies were hacked, including AT&T, Verizon, T-Mobile...
'Tis the Season for Holiday Scams
Scammers are especially active during the holiday season. The crooks are taking advantage of the consumer's good cheer, generous nature, and hunt for...
Legislation to Protect Kids Online
The Children's Online Privacy Protection Act (COPPA) became effective on April 21, 2000. The act is designed to protect children under age 13...
Tabletop Triumph
Mastering incident response though simulation can assist with strengthening your plan. Once an incident response plan (IRP) is written, it does not prove...
How to Combat Administrative Sprawl
Administrative sprawl refers to the granting of unnecessary administrative permissions to resources. Many times there are controls put in place for granting elevated...
Cybersecurity Awareness Month -That's a Wrap!
As Cybersecurity Awareness Month comes to a close it is important to continue to exercise best practices throughout the year. Each October is...
CSAM - Update Software
October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...
CSAM - Recognize and Report Phishing
October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...
CSAM - Turn on Multifactor Authentication
October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...
CSAM-Use Strong Passwords & a Password Manager
October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...
Cybersecurity Awareness Month-October 2024
Cybersecurity Awareness Month is dedicated to raise awareness about the importance of cybersecurity. Celebrated every October, this initiative will be celebrating it's 21st...
Automated Moving Target Defense (AMTD)
The static nature of most systems provide attackers with an advantage for finding vulnerabilities and launching attacks. To counter this threat, emerging technologies...
IAM I Said
A good cybersecurity posture includes controlling access to assets. There are 2 approaches that are common and can be used together. It's important...
Managing Change Management
Change is hard. Change means work. But sometimes, as in the case of IT, change is necessary. Change management assists in planning and...
Best Practices in Media Storage and Destruction
Most organizations collect, maintain and store massive amounts of sensitive and personal data. Understanding regulations surrounding this data is crucial to protecting it...
NIST CSF Gets a Facelift!
Introducing the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) version 2.0. Nationally recognized as a cybersecurity framework for institutions to align with, the upgrades include some forward thinking improvements. The sets of controls are focused on risk management.