What is a Firewall?

firewall boy in thought

What is a Firewall? The Internet’s Most Misunderstood Protection No security professional, IT guru, or shade tree PC tech will ever tell you to connect directly to the Internet unprotected. If you ask anyone, they will all say you need a firewall to protect your data and all the devices in your home or office. […]

Hacker Series – Exit Strategy

hacker

Hacker Series – Exit Strategy OR…5 Ways To Keep Your Insides Inside I am a hacker and I am in your corporate computer network. The great thing about computer networks is all computers in the whole company are connected to every other computer. It’s also the bad thing. Because I was able to gain access […]

Hacker Series – Playing Hard To Get

hacker

Hacker Series – Playing Hard To Get OR…5 Ways To Stop Hackers In Their Tracks I am a hacker. After scouring one million IP addresses in the United States, I compiled a list of plump targets ripe for exploitation. (If you missed part 1, click here). While I wait for the rest of my scans […]

Cyber Defense – The Meaning of Technology

Man and Baby

Cyber Defense – The Meaning of…Technology OR Not In Front of the Interns! Life is hard enough without constantly worrying about cybercrime. Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data, money, and put you completely out of business. You need Policy, Education, […]

Cyber Defense – Kingdom Policies

Kingdom Policies

Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data and money, and put you completely out of business. You […]

Unlocking the Cybersecurity Insurance Questionnaire

Walls closing in

Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the last two years. So, the storm isn’t over, but you made it this far, and you are well on your way to finding that treasure of financial success. Then, your […]

Cybersecurity Foundations – Access Control

Access Denied

Cybersecurity Foundations – Access Control OR Knock, Knock. Who’s There? Access Control is more than permissions. Once you have completed a Risk Assessment and understand your Intellectual Property and its value, you must protect it. Like everything in business, proper Access Control begins with a written policy that explains who, what, when, where, how, and […]

A One-Sided Cyberwar with Russia

A One-Sided Cyberwar with Russia OR That’s Not Yogi Nor Does He Want Your Pic-i-nic Baskets Am I the only one feeling early 80s vibes? What has possessed the superpowers of the world into this standoff? Beijing won’t stand by idly if things get hot, but not likely before the Olympics end on February 20th. […]

Take This 5 Question Cloud Test Before You Go Live!

Cloud IT

Take This 5 Question Cloud Test Before You Go Live! Congratulations! You’ve decided to move into the Cloud. You are ready to enjoy the accessibility and redundancy of Cloud-based data, computing, email, telephone, or other services offered. But is your network ready? Here’s your study guide before taking the test! Redundant Internet Connections Now that […]