7 Policy Changes To Prevent Corporate Breaches

7 Policy Changes to Prevent Corporate Breaches OR…Head-In-The-Sand Is NOT A Security Posture Home Depot and Target could not prevent corporate breaches, losing almost 100 million credit card records because of failed cybersecurity policy (Read about these breaches here). To this day, some people refuse to use their cards in either store. Losing trust is […]
Cyber Defense – The Meaning of Technology

Cyber Defense – The Meaning of…Technology OR Not In Front of the Interns! Life is hard enough without constantly worrying about cybercrime. Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data, money, and put you completely out of business. You need Policy, Education, […]
Cyber Defense – Kingdom Policies

Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data and money, and put you completely out of business. You […]
Unlocking the Cybersecurity Insurance Questionnaire

Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the last two years. So, the storm isn’t over, but you made it this far, and you are well on your way to finding that treasure of financial success. Then, your […]
Cybersecurity Foundations – Business Continuity

Foundations – Business Continuity OR Who You Callin’ A Psycho? What happens if? Asking this question helps us keep a business (or household) going in the event of an “incident.” What is an incident? Oh, it could be anything that is outside the normal, day-to-day operations that disrupt life as we know it. Doesn’t need […]
Cybersecurity Foundations – Access Control

Cybersecurity Foundations – Access Control OR Knock, Knock. Who’s There? Access Control is more than permissions. Once you have completed a Risk Assessment and understand your Intellectual Property and its value, you must protect it. Like everything in business, proper Access Control begins with a written policy that explains who, what, when, where, how, and […]
Cybersecurity Foundations – Acceptable Use Policy

Cybersecurity Foundations – Acceptable Use Policy OR You Didn’t Say I Couldn’t Do It Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra of different technologies, departments, budgets, people, and policies. To someone unfamiliar, it can be similar to standing at the base of Mount Everest with a secure environment at […]
Cybersecurity Foundations – Risk Assessment and BIA

Cybersecurity Foundations – Risk Assessment and BIA OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is often the hardest meeting to schedule with all relevant parties, the Risk Assessment (RA). The RA is part of a Business Impact Analysis (BIA) that directly feeds policy creation but […]
Horror Stories – ZOMBIES!

Horror Stories – ZOMBIES! OR I Smell Bandwidth! I Want To Eat Your Bandwidth! It’s an age-old debate. Walkers or Runners? Brains or Flesh? Bandwidth or Backdoors? Well, the last refers to a different type of Zombie. These are the devices, either old or improperly configured, that devour your production Internet and network capacity or […]