Cyber Defense – Empirical Education

Cyber Defense

Cyber Defense – Empirical Education OR Bloody Do-Gooders! Your business has grown to an empire, and the barbarians of cybercrime threaten it! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, pillaging your data, money and trying to erase you from the landscape. You need a cyber defense […]

Cyber Defense – Kingdom Policies

Kingdom Policies

Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data and money, and put you completely out of business. You […]

Unlocking the Cybersecurity Insurance Questionnaire

Walls closing in

Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the last two years. So, the storm isn’t over, but you made it this far, and you are well on your way to finding that treasure of financial success. Then, your […]

Cybersecurity Foundations – Risk Assessment and BIA

Cyber Risk

Cybersecurity Foundations – Risk Assessment and BIA OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is often the hardest meeting to schedule with all relevant parties, the Risk Assessment (RA). The RA is part of a Business Impact Analysis (BIA) that directly feeds policy creation but […]

A One-Sided Cyberwar with Russia

A One-Sided Cyberwar with Russia OR That’s Not Yogi Nor Does He Want Your Pic-i-nic Baskets Am I the only one feeling early 80s vibes? What has possessed the superpowers of the world into this standoff? Beijing won’t stand by idly if things get hot, but not likely before the Olympics end on February 20th. […]

Cybersecurity Basics – Tech Lords

Cyber Security Tech

Cybersecurity Basics – Tech Lords OR My Other Car is a Police Call Box This three-part series covers the basics of cybersecurity for three different user levels. The final entry speaks to the administrators, the technical gurus that keep data flowing and businesses running. What wisdom can possibly be imparted upon such tech heads that they don’t […]

Cybersecurity Basics – Daily Users

Cybersecurity Lock

Cybersecurity Basics – Daily Users OR Don’t Develop a Case of the Mondays This three-part series covers the basics of cybersecurity for three different user levels. Last week I spoke to the novice. Today’s entry is for daily computer users. You use a computer, tablet, or mobile device for work, school, or home. You can […]

Cybersecurity Basics – Novice

Cyber Security

Cyber Security Basics – Novice OR Grandma’s Got a Brand New Smart Bag This three-part series covers the basics of cybersecurity for three different user levels. The first is the novice technologist – those who wouldn’t use the technology if it wasn’t so darn convenient. The next category is the daily user – you check […]

Ransomware Survival – Part 3

Cyber Lock

Ransomware Survival – Part 3 OR Live, Work, but Don’t Repeat I had to plug in my Serious Keyboard for this post. When the dust settles and some semblance of normality has returned, it is time to understand what happened, how it happened, and how to prevent or mitigate a repeat. However, many small to […]

Ransomware Survival – Part 2

Cyber Lock

Ransomware Survival – Part 2 OR The Unintended Vice of Ignorance WARNING: Due the seriousness of the material, stickers have been added to lighten the mood. The phone rings on Saturday morning. Why, it’s Marvin from the office, and he sounds nervous. He reports that a computer has a ransomware message on the screen and unconfirmed […]