Cyber Defense – The Meaning of Technology

Man and Baby

Cyber Defense – The Meaning of…Technology OR Not In Front of the Interns! Life is hard enough without constantly worrying about cybercrime. Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data, money, and put you completely out of business. You need Policy, Education, […]

Cyber Defense – Kingdom Policies

Kingdom Policies

Cyber Defense – Kingdom Policies OR I Told Him We Already Got One The organization is a kingdom, and cybercrime has it under siege! Did you know cybercrime is now the world’s third-largest economy? These enemies are state-funded and numerous, looking to steal your data and money, and put you completely out of business. You […]

Unlocking the Cybersecurity Insurance Questionnaire

Walls closing in

Unlocking the Cybersecurity Insurance Questionnaire OR Insurance. Why does it always have to be insurance? Congratulations! our company survived whatever the heck you call the last two years. So, the storm isn’t over, but you made it this far, and you are well on your way to finding that treasure of financial success. Then, your […]

Cybersecurity Foundations – Business Continuity

Business Continuity

Foundations – Business Continuity OR Who You Callin’ A Psycho? What happens if? Asking this question helps us keep a business (or household) going in the event of an “incident.” What is an incident? Oh, it could be anything that is outside the normal, day-to-day operations that disrupt life as we know it. Doesn’t need […]

Cybersecurity Foundations – Access Control

Access Denied

Cybersecurity Foundations – Access Control OR Knock, Knock. Who’s There? Access Control is more than permissions. Once you have completed a Risk Assessment and understand your Intellectual Property and its value, you must protect it. Like everything in business, proper Access Control begins with a written policy that explains who, what, when, where, how, and […]

Cybersecurity Foundations – Acceptable Use Policy

Cyber Policy

Cybersecurity Foundations – Acceptable Use Policy OR You Didn’t Say I Couldn’t Do It Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra of different technologies, departments, budgets, people, and policies. To someone unfamiliar, it can be similar to standing at the base of Mount Everest with a secure environment at […]

Cybersecurity Foundations – Risk Assessment and BIA

Cyber Risk

Cybersecurity Foundations – Risk Assessment and BIA OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is often the hardest meeting to schedule with all relevant parties, the Risk Assessment (RA). The RA is part of a Business Impact Analysis (BIA) that directly feeds policy creation but […]

Horror Stories – ZOMBIES!

Zombies

Horror Stories – ZOMBIES! OR I Smell Bandwidth! I Want To Eat Your Bandwidth! It’s an age-old debate. Walkers or Runners? Brains or Flesh? Bandwidth or Backdoors? Well, the last refers to a different type of Zombie. These are the devices, either old or improperly configured, that devour your production Internet and network capacity or […]