TechGuard Blog


Michelle Stamps

Michelle has over 10 years of experience in marketing and business development across various industries including government and non-profit. Her background in writing, facilitating presentations and event planning allows her to use her creative skill-set and her relationship building skills strengthens her ability to understand the human element role in cybersecurity and to support positive behavior change. Whether she is out in the community, blogging or developing the next social post for TechGuard, she believes in telling the company’s story and uses relatable, real-life examples to connect with our clients. If you know Michelle outside of work, you would know that she loves sunny days and tropical places.
Find me on:

Recent Posts

Could a Phishing Email Get your Employees Fired?

Although most of us have heard plenty of times to watch out for business email compromise (BEC), often employees still feel tempted to click on the bait before they really think through the consequences. Even worse, as soon as they realize they should...

Don't let these 10 Cybersecurity Myths Fool You

Nearly every day we learn of another business hit with a cyberattack whether it is a point-of-sale system or a general data breach. No matter the type of attacks that continue to surface, many employees are stuck in the old mindsets of why attacks...

How Strategic Partnerships Benefit You

Increased revenue is an obvious benefit to any strategic partnership. However, beyond revenue, there's several perks a good partnership can bring to your business. To have a successful partnership agreement it must be a win-win for both parties. The...

One Employee, One Click...That's all it Takes

Every single employee has a role and responsibility in securing your company. Change the old mindset that security is a task for IT alone. One single vulnerability could have a critical impact on your company's existence. Explore how you can...

The ROI of Security Awareness Training

Cybersecurity issues are becoming a daily struggle for companies. In fact, trends indicate a significant increase in hacked and breached data from very common workplace sources such as mobile devices and Internet of Things (IOT). The average...

Security Awareness Training: How to get Buy-In from your Boss

Before you can gain buy-in from management you need to understand what motivates them. Securing their reputation and protecting their bottom line will usually draw their interest. As a middle rank, you have an important job to do. You gather valuable...

Top 5 Security Awareness Training Topics

You understand that human behavior plays a huge part in the security posture of your company and that each employee plays an important role in security. So you've decided to go ahead and purchase a Security Training Awareness Solution. However,...

Mobile Security Concerns on the Rise

One major take away from the recent RSA Conference is that companies are increasingly concerned about the growing threats with mobile devices. This is no surprise as we see employees working from almost any type of setting and always online. In...

Keep Employees Safe from SMiShing Attacks

Dear Jon, Capitol One needs you to verify your PIN number immediately to confirm you are the proper account holder. Some accounts have been breached. We urgently ask you to protect yourself by confirming information here...   If your employee...

Your #1 Security Threat - Well-Intended Employees

Imagine you are sitting at the Urgent Care facility and waiting for a test result. The nurse comes in and says, "Karen, fortunately, you do not have strep." Oddly, you are not Karen and you did not come in to be tested for strep. However, you...

Don't Make this Critical Mistake Before your Audit

AUDIT – that five letter word that no business leader looks forward to hearing. Today, security related audits are a critical (and often stressful) part of doing business. Audits not only ensure you are meeting industry standards, but they...

Bring Your Own Device: A Luxury or a Nightmare?

Flexibility in the workplace can be a beautiful thing, but companies should carefully weigh the security risks associated with allowing "Bring Your Own Device." In addition, employees should be fully aware of the potential ramifications. For example,...

1 2 3 4

 


 

Read More Articles →