Similar Posts
Lessons to Learn from the MGM-Caesars Breach
The breaches of both MGM and Caesars were not high tech; they were pure social engineering attacks. That means that you can harden your company and your information likely for very little money. While this is early in the game, there are some easy lessons to learn here. Here are some key takeaways from the…
MFA Fatigue – What is it and How to Protect Yourself
MFA Fatigue is a relatively new attack method and is a way to try and get around MFA security. Learn what it is and how to protect yourself and your company against it, here. Audio Video
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
What is a Shared Responsibility Model?
If you don’t know what this is and don’t have it documented for each of your external and cloud providers, the first step is to listen to this post. The second step may be to contact us for assistance. Ignoring it is not an option that will turn out well. It leads to outages and…
What is the Shared Responsibility Model and How Does it Affect Me?
The shared responsibility model is the way that cloud service providers reduce their risk if something bad happens. For the most part, unless you have an unusual contract with your cloud service provider, if something bad happens, it is your problem. If you have not planned for this, you could be in deep yogurt. Learn…
What Should You Preserve When Employees Leave?
Employees come and go and 99% of the time it is innocuous. Occasionally companies get involved in lawsuits as well. Properly preserving evidence (or preserving it at all) can be the difference between finding out what you need or prevailing in a lawsuit. Are you prepared? Audio Video