TechGuard Blog


Michelle Stamps

Michelle has over 10 years of experience in marketing and business development across various industries including government and non-profit. Her background in writing, facilitating presentations and event planning allows her to use her creative skill-set and her relationship building skills strengthens her ability to understand the human element role in cybersecurity and to support positive behavior change. Whether she is out in the community, blogging or developing the next social post for TechGuard, she believes in telling the company’s story and uses relatable, real-life examples to connect with our clients. If you know Michelle outside of work, you would know that she loves sunny days and tropical places.
Find me on:

Recent Posts

How Strategic Partnerships Benefit You

Increased revenue is an obvious benefit to any strategic partnership. However, beyond revenue, there's several perks a good partnership can bring to your business. To have a successful partnership agreement it must be a win-win for both parties. The...

One Employee, One Click...That's all it Takes

Every single employee has a role and responsibility in securing your company. Change the old mindset that security is a task for IT alone. One single vulnerability could have a critical impact on your company's existence. Explore how you can...

The ROI of Security Awareness Training

Cybersecurity issues are becoming a daily struggle for companies. In fact, trends indicate a significant increase in hacked and breached data from very common workplace sources such as mobile devices and Internet of Things (IOT). The average...

Security Awareness Training: How to get Buy-In from your Boss

Before you can gain buy-in from management you need to understand what motivates them. Securing their reputation and protecting their bottom line will usually draw their interest. As a middle rank, you have an important job to do. You gather valuable...

Top 5 Security Awareness Training Topics

You understand that human behavior plays a huge part in the security posture of your company and that each employee plays an important role in security. So you've decided to go ahead and purchase a Security Training Awareness Solution. However,...

Mobile Security Concerns on the Rise

One major take away from the recent RSA Conference is that companies are increasingly concerned about the growing threats with mobile devices. This is no surprise as we see employees working from almost any type of setting and always online. In...

Keep Employees Safe from SMiShing Attacks

Dear Jon, Capitol One needs you to verify your PIN number immediately to confirm you are the proper account holder. Some accounts have been breached. We urgently ask you to protect yourself by confirming information here...   If your employee...

Your #1 Security Threat - Well-Intended Employees

Imagine you are sitting at the Urgent Care facility and waiting for a test result. The nurse comes in and says, "Karen, fortunately, you do not have strep." Oddly, you are not Karen and you did not come in to be tested for strep. However, you...

Don't Make this Critical Mistake Before your Audit

AUDIT – that five letter word that no business leader looks forward to hearing. Today, security related audits are a critical (and often stressful) part of doing business. Audits not only ensure you are meeting industry standards, but they...

Bring Your Own Device: A Luxury or a Nightmare?

Flexibility in the workplace can be a beautiful thing, but companies should carefully weigh the security risks associated with allowing "Bring Your Own Device." In addition, employees should be fully aware of the potential ramifications. For example,...

Webcam and Audio Hacked

As you have probably heard, Apple disabled its Group FaceTime feature to fix a security flaw that was discovered. The security flaw allowed someone using Group FaceTime to listen in on the call recipient's microphone even if the call recipient did...

Four Risks and Solutions when using QR Codes

Today’s technology provides hackers countless ways to gain unauthorized access to private and sensitive information. News of breaches and cyberattacks are far too common and over the past two years over 100 million Americans have been impacted....

1 2 3 4

 


 

Read More Articles →