THE BLOG
Read Your Way To Tech Savvy, Cybersecurity, and Other Interesting Topics
If knowledge is power and with great power comes great responsibility, then logically speaking, it is your responsibility to be here on our blog! Beyond simply informing and training, these articles aim to entertain and enlighten. In some cases, we barely scrape the tip of the iceberg, but the rabbit hole of cybersecurity is deep, and we hope to be your guide through the often overwhelming subject.

Prepare for Grid Failure
Prepare for Grid Failure OR…Hope You Bought A Can Opener Prepare for grid failure! A power grid failure could upset the balance of society. Don’t

The 7 Deadly Sins of AI
The 7 Deadly Sins of AI OR…What’s In The BOOOX??? Surprise, there’s another division. Companies around the world are rushing off into AI territories to

Why Password Managers Are Key
Why Password Managers Are Key OR…I Forgot What I Forgot While certain password managers have recently suffered corporate side breaches, don’t let it dissuade you

What is Artificial Intelligence (AI)?
What is Artificial Intelligence (AI)? OR What are you doing, Dave? Artificial Intelligence (AI) seems to be everywhere now. It’s part of your email and

Secure Banking Communications to Protect Consumers
Secure Banking Communications to Protect Consumers This article was co-authored by Richard Koontz With consumer confidence at an all-time low and corporations placing profits over

Guide To The Dark Web
Guide To The Dark Web OR…I Think I See Something The Dark Web is a section of the Internet “hidden” from the open Internet, the

8 Ways To Protect Yourself From Breaches
8 Ways To Protect Yourself From Breaches OR…Et tu, Best Buy? Consumer breaches occur when companies have personal or confidential data stolen, either from the

11 Tips IT Managers Need To Stop Breaches
11 Tips IT Managers Need To Stop Breaches OR…Silence Is Acceptance Few fears keep pro techies awake at night more than breaches. We’ve heard the

7 Policy Changes To Prevent Corporate Breaches
7 Policy Changes to Prevent Corporate Breaches OR…Head-In-The-Sand Is NOT A Security Posture Home Depot and Target could not prevent corporate breaches, losing almost 100

Cyber Defense – The Meaning of Technology
Cyber Defense – The Meaning of…Technology OR Not In Front of the Interns! Life is hard enough without constantly worrying about cybercrime. Did you know

Cyber Defense – Empirical Education
Cyber Defense – Empirical Education OR Bloody Do-Gooders! Your business has grown to an empire, and the barbarians of cybercrime threaten it! Did you know

Cyber Defense – Kingdom Policies
Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did

Unlocking the Cybersecurity Insurance Questionnaire
Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the

Cybersecurity Foundations – Business Continuity
Foundations – Business Continuity OR Who You Callin’ A Psycho? What happens if? Asking this question helps us keep a business (or household) going in

Cybersecurity Foundations – Access Control
Cybersecurity Foundations – Access Control OR Knock, Knock. Who’s There? Access Control is more than permissions. Once you have completed a Risk Assessment and understand

Practical Power Protection Guide
Practical Power Protection Guide OR You’ve Got The Power, AC and DC! Technology without electricity? Our modern way of life would be impossible without it,

Cybersecurity Foundations – Acceptable Use Policy
Cybersecurity Foundations – Acceptable Use Policy OR You Didn’t Say I Couldn’t Do It Cybersecurity, or security of any kind, is a vast and sometimes

Grid Failure Survival Guide
Grid Failure Survival Guide OR Be The Ants, Not The Grasshopper Disaster Planning covers situations such as grid failure when the unexpected or unprecedented happens

Cybersecurity Foundations – Risk Assessment and BIA
Cybersecurity Foundations – Risk Assessment and BIA OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is

Cybersecurity Foundations – Frameworks and Policy
Cybersecurity Foundations – Frameworks and Policy OR Did You Read the Instructions? Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra

A One-Sided Cyberwar with Russia
A One-Sided Cyberwar with Russia OR That’s Not Yogi Nor Does He Want Your Pic-i-nic Baskets Am I the only one feeling early 80s vibes?

Wrangling and Securing IT Vendors
Wrangling and Securing IT Vendors OR Who Let the Intellectual Property Out? Who? Who? Who? Who? Who? No single vendor can provide every Information Technology

Building A Better Democracy
Building A Better Democracy OR Secure Your Right…to Election Integrity I was recently asked how to build a secure voting system. There are two schools of

Horror Stories – No Electricity
Horror Stories – No Electricity OR Pitch Black Electricity is like oxygen. You don’t think about it until you aren’t getting any. Sure, you have surge protectors,

Horror Stories – ZOMBIES!
Horror Stories – ZOMBIES! OR I Smell Bandwidth! I Want To Eat Your Bandwidth! It’s an age-old debate. Walkers or Runners? Brains or Flesh? Bandwidth

Horror Stories – No People
Horror Stories – No People OR Hello? Anybody? No, I don’t mean the Zombie Apocalypse has rendered the Centers for Disease Control (CDC) an imploded pile of

Horror Stories – No Internet
Horror Stories – No Internet OR Offline, No One Can Hear You Scream The Cloud! How convenient! Our email and files are always available 100%

Cybersecurity Basics – Tech Lords
Cybersecurity Basics – Tech Lords OR My Other Car is a Police Call Box This three-part series covers the basics of cybersecurity for three different

Cybersecurity Basics – Daily Users
Cybersecurity Basics – Daily Users OR Don’t Develop a Case of the Mondays This three-part series covers the basics of cybersecurity for three different user

Cybersecurity Basics – Novice
Cyber Security Basics – Novice OR Grandma’s Got a Brand New Smart Bag This three-part series covers the basics of cybersecurity for three different user

Phishing Phinding (and Avoidance)
Phish Phinding (and Avoidance) OR You Think I’m Gonna Bite That? Phishing, Smishing, Vishing – Sounds like a Lewis Carroll nursery rhyme. Learn to identify

Password Intervention
Password Intervention OR No Hate Mail, Please – You Need To Hear This Julian Assange. Colonial Pipeline. Edward Snowden. What do they all have in

The End of Email?
The End of Email? OR What Have You Done For Me Lately? 90% of breaches start with a phishing email. Some reports say half of

Ransomware Survival – Part 3
Ransomware Survival – Part 3 OR Live, Work, but Don’t Repeat I had to plug in my Serious Keyboard for this post. When the dust

Ransomware Survival – Part 2
Ransomware Survival – Part 2 OR The Unintended Vice of Ignorance WARNING: Due the seriousness of the material, stickers have been added to lighten the mood.

Ransomware Survival – Part 1
Ransomware Survival – Part 1 OR, How I Learned To Stop Worrying and Love the Tape Part 1 – Intro and Prep Ransomware is probably

Slow Internet? Here Are 9 Possible Causes.
Slow Internet? Here Are 9 Possible Causes Why is the Internet so slow? We pay for 100 Megs; why is my maximum download speed under

Take This 5 Question Cloud Test Before You Go Live!
Take This 5 Question Cloud Test Before You Go Live! Congratulations! You’ve decided to move into the Cloud. You are ready to enjoy the accessibility