10 Tips To Deter Social Engineering

Angry furious young blonde deter

10 Tips To Deter Social Engineering Only You Can Prevent Data Theft Most office spaces were not designed with security in mind. Multiple entry points, open corridors, and networks ports in unprotected areas are difficult to protect. Those with a single entry post a receptionist or operator as a gatekeeper thinking any human will deter […]

CrowdStrike Outage Punctuates Vendor Fatigue

An exhausted customer vendor service rep snoozing on her computer with her hand still clutched to her coffee

CrowdStrike Outage Punctuates Vendor Fatigue Outsourcing Gaps Show IT Weaknesses Even before CrowdStrike disbaled Windows computers worldwide, companies of all sizes were feeling vendor fatigue. Many companies who were wooed to Cloud-based, off-site support for IT services were already exploring either in-house or local alternatives. Besides delays and communication issues, customers found far too many […]

10 Tips To Get Cloud Ready

A beautiful young blonde woman sheltering under a torn and tattered yellow umbrella looks up miserably as she waits for a thunderstorm cloud to pass.

10 Tips To Get Cloud Ready Sticker Shock May Occur! Many reasons exist that drive businesses to the Cloud. Some want redundancy of services and protection of data their current office environment simply can’t handle. Some want to offer services to all users both in and out of the office. Others see it as a […]

Stop Corporate Data Thieves Cold

High resolution digital image of a man in a kitchen, early in the morning, opening a cabinet and unintentionally releasing a swarm of juvenile raccoons. The raccoons are streaming from the open cabinet, and several of them have jumped onto the man, including one that is covering his face like a mask, one perched on his leg, and several hanging off of his arms. The raccoons have also knocked over a box of macaroni, and a can of tuna, because they are awful little creatures who have no respect for other people's things. The eye of the man is just visible beneath the raccoon covering his face, and his surprise and terror are obvious. Kitchen bathed in a warm golden morning light, and an Italian style coffee pot is sitting on the stove. Thieves

Stop Corporate Data Thieves Cold Help To Restore Your Peace of Mind Not every employee and asset in your office works for you. Sure, there are those who secretly surf the web or watch videos all day. Those are petty thieves compared to the real insider threats hiding in your organization. How did they get […]

What is a Firewall?

firewall boy in thought

What is a Firewall? The Internet’s Most Misunderstood Protection No security professional, IT guru, or shade tree PC tech will ever tell you to connect directly to the Internet unprotected. If you ask anyone, they will all say you need a firewall to protect your data and all the devices in your home or office. […]

Hacker Series – Exit Strategy

hacker

Hacker Series – Exit Strategy OR…5 Ways To Keep Your Insides Inside I am a hacker and I am in your corporate computer network. The great thing about computer networks is all computers in the whole company are connected to every other computer. It’s also the bad thing. Because I was able to gain access […]

Hacker Series – Playing Hard To Get

hacker

Hacker Series – Playing Hard To Get OR…5 Ways To Stop Hackers In Their Tracks I am a hacker. After scouring one million IP addresses in the United States, I compiled a list of plump targets ripe for exploitation. (If you missed part 1, click here). While I wait for the rest of my scans […]

Cyber Defense – The Meaning of Technology

Man and Baby

Cyber Defense – The Meaning of…Technology OR Not In Front of the Interns! Life is hard enough without constantly worrying about cybercrime. Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data, money, and put you completely out of business. You need Policy, Education, […]

Cyber Defense – Kingdom Policies

Kingdom Policies

Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data and money, and put you completely out of business. You […]

Unlocking the Cybersecurity Insurance Questionnaire

Walls closing in

Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the last two years. So, the storm isn’t over, but you made it this far, and you are well on your way to finding that treasure of financial success. Then, your […]