THE BLOG
Read Your Way To Tech Savvy, Cybersecurity, and Other Interesting Topics
If knowledge is power and with great power comes great responsibility, then logically speaking, it is your responsibility to be here on our blog! Beyond simply informing and training, these articles aim to entertain and enlighten. In some cases, we barely scrape the tip of the iceberg, but the rabbit hole of cybersecurity is deep, and we hope to be your guide through the often overwhelming subject.

Cyber Defense – The Meaning of Technology
Cyber Defense – The Meaning of…Technology OR Not In Front of the Interns! Life is hard enough without constantly worrying about cybercrime. Did you know

Cyber Defense – Empirical Education
Cyber Defense – Empirical Education OR Bloody Do-Gooders! Your business has grown to an empire, and the barbarians of cybercrime threaten it! Did you know

Cyber Defense – Kingdom Policies
Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did

Unlocking the Cybersecurity Insurance Questionnaire
Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the

Cybersecurity Foundations – Business Continuity
Foundations – Business Continuity OR Who You Callin’ A Psycho? What happens if? Asking this question helps us keep a business (or household) going in

Cybersecurity Foundations – Access Control
Cybersecurity Foundations – Access Control OR Knock, Knock. Who’s There? Access Control is more than permissions. Once you have completed a Risk Assessment and understand

Practical Power Protection Guide
Practical Power Protection Guide OR You’ve Got The Power, AC and DC! Technology without electricity? Our modern way of life would be impossible without it,

Cybersecurity Foundations – Acceptable Use Policy
Cybersecurity Foundations – Acceptable Use Policy OR You Didn’t Say I Couldn’t Do It Cybersecurity, or security of any kind, is a vast and sometimes

Grid Failure Survival Guide
Grid Failure Survival Guide OR Be The Ants, Not The Grasshopper Disaster Planning covers situations such as grid failure when the unexpected or unprecedented happens

Cybersecurity Foundations – Risk Assessment and BIA
Cybersecurity Foundations – Risk Assessment and BIA OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is

Cybersecurity Foundations – Frameworks and Policy
Cybersecurity Foundations – Frameworks and Policy OR Did You Read the Instructions? Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra

A One-Sided Cyberwar with Russia
A One-Sided Cyberwar with Russia OR That’s Not Yogi Nor Does He Want Your Pic-i-nic Baskets Am I the only one feeling early 80s vibes?

Wrangling and Securing IT Vendors
Wrangling and Securing IT Vendors OR Who Let the Intellectual Property Out? Who? Who? Who? Who? Who? No single vendor can provide every Information Technology

Building A Better Democracy
Building A Better Democracy OR Secure Your Right…to Election Integrity I was recently asked how to build a secure voting system. There are two schools of

Horror Stories – No Electricity
Horror Stories – No Electricity OR Pitch Black Electricity is like oxygen. You don’t think about it until you aren’t getting any. Sure, you have surge protectors,

Horror Stories – ZOMBIES!
Horror Stories – ZOMBIES! OR I Smell Bandwidth! I Want To Eat Your Bandwidth! It’s an age-old debate. Walkers or Runners? Brains or Flesh? Bandwidth

Horror Stories – No People
Horror Stories – No People OR Hello? Anybody? No, I don’t mean the Zombie Apocalypse has rendered the Centers for Disease Control (CDC) an imploded pile of

Horror Stories – No Internet
Horror Stories – No Internet OR Offline, No One Can Hear You Scream The Cloud! How convenient! Our email and files are always available 100%

Cybersecurity Basics – Tech Lords
Cybersecurity Basics – Tech Lords OR My Other Car is a Police Call Box This three-part series covers the basics of cybersecurity for three different

Cybersecurity Basics – Daily Users
Cybersecurity Basics – Daily Users OR Don’t Develop a Case of the Mondays This three-part series covers the basics of cybersecurity for three different user

Cybersecurity Basics – Novice
Cyber Security Basics – Novice OR Grandma’s Got a Brand New Smart Bag This three-part series covers the basics of cybersecurity for three different user

Phishing Phinding (and Avoidance)
Phish Phinding (and Avoidance) OR You Think I’m Gonna Bite That? Phishing, Smishing, Vishing – Sounds like a Lewis Carroll nursery rhyme. Learn to identify

Password Intervention
Password Intervention OR No Hate Mail, Please – You Need To Hear This Julian Assange. Colonial Pipeline. Edward Snowden. What do they all have in

The End of Email?
The End of Email? OR What Have You Done For Me Lately? 90% of breaches start with a phishing email. Some reports say half of

Ransomware Survival – Part 3
Ransomware Survival – Part 3 OR Live, Work, but Don’t Repeat I had to plug in my Serious Keyboard for this post. When the dust

Ransomware Survival – Part 2
Ransomware Survival – Part 2 OR The Unintended Vice of Ignorance WARNING: Due the seriousness of the material, stickers have been added to lighten the mood.

Ransomware Survival – Part 1
Ransomware Survival – Part 1 OR, How I Learned To Stop Worrying and Love the Tape Part 1 – Intro and Prep Ransomware is probably

Slow Internet? Here Are 9 Possible Causes.
Slow Internet? Here Are 9 Possible Causes Why is the Internet so slow? We pay for 100 Megs; why is my maximum download speed under

Take This 5 Question Cloud Test Before You Go Live!
Take This 5 Question Cloud Test Before You Go Live! Congratulations! You’ve decided to move into the Cloud. You are ready to enjoy the accessibility