Get Our Weekly Blog Sent Straight to Your Inbox
Why You Need an Incident Response Plan
Imagine you are a big hotel chain getting ready to close a large acquisition. You're growing at a rapid pace, and everyone knows your name. Your brand reputation lends itself to professionalism and the trust to deliver a well-designed, modern, clean...
Creating a Top-Down Security Culture
The philosophy of creating a top-down security-minded culture at work makes perfect sense. How many times have you heard the saying "practice what you preach"? Often I think of parents and school teachers creating this type of top-down culture to be...
How to Respond to a Breach within your Company
Every day we hear of another breach and as they continue to pop up, we become less surprised. Information travels quickly. For example, consider how many stories of breached data you've heard of in the news lately. Most will remember some of the famous ...
What is IT Security worth without Physical Security?
If your organization has a high standard of IT security but is lacking in physical security, you're leaving yourself vulnerable. There's so much to protect ranging from human safety and private information to physical assets and more. Protecting your...
Recommendations for the Log4j Vulnerability
A remote code Execution has been detected in the wild, known as the Log4j Vulnerability. This vulnerability allows an attacker to have the potential to carry out remote code execution on Java-based apps using Log4j or webservers with Apache Log4j.
Is Public Wi-fi Safe for Business Use?
No. Kind of.
Protect Yourself this Holiday Season
The holiday season brings many people joy for obvious reasons. Families get together, kids get to experience possibly the most innocent and joyous time, Christmas morning with Santa. For others, however, it can bring some stressful situations.
Beware Online Scams This Holiday Shopping Season
Every year advancements in technology allow us to get more and do more than years prior. Everything is faster because people want and expect things faster. We’re accustomed to it now, and businesses know they must keep up with consumer demand to survive....
What DOD Contractors Need to Know About CMMC’s New “Strategic Direction”
The Cybersecurity Maturity Model Certification (CMMC) program is being revised to streamline compliance for contractors in the Defense Industrial Base (DIB) looking to do business with the government. This is great news for small businesses, which might...
Could Your Password be Hacked?
A password can secure an account and prevent unauthorized usage. Could hackers guess your log-in credentials? In a recent survey of passwords of Western Australian government officials, some interesting password statistics were discovered. Almost 1,500...
The Cybersecurity Labor Shortage
If you’re anything like me, you’re a little tired of hearing about Covid. You’re tired of hearing about the “shortages” that seem to follow along with the timeline of Covid. I’ve heard them all; coin shortage, toilet paper shortage, sanitizer shortage,...
'Check the Box' Compliance Isn't Enough
How does your company handle security compliance? Is your approach to security the bare minimum, or is it next level? Does your company follow through with recommendations after they check the boxes? Security compliance is a good and necessary starting...