Similar Posts
The Risk of BYOD – Non-Managed Devices
Many companies allow, encourage and/or require employees to use personally owned devices. While it seems that, at least in the short term, this is a money saving and morale boosting move, in the long term, it may be an existential threat to the company. In this post we are going to use one company who…
Disaster Recovery for Password Managers and MFA apps
Many of us use password managers and some of us use multi-factor authentication apps and, in many cases, that app lives on your phone. But what happens if your phone breaks, gets dropped in the toilet or run over by your car? What do you do then? I learned some things today and have some…
March 2023 Update for CMMC
CMMC is an ever changing target. Here is the newest information on it that we have.
DoD CMMC Update – February 1, 2023
For those of you who are covered by DoD’s cybersecurity regulations such as 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting, you probably know that it is a bit of a moving target. We expect a flurry of updates later this spring, but in the mean time, you should be working on compliance. Here…
Beware of Bogus QR Codes
The FBI has issued a warning about scammers posting bogus QR codes using a variety of different methods from printing them on a piece of paper to including the bogus codes in an application. Learn more: Audio Video
The Risk-Reward Tradeoffs of GPT AI
Everyone is using AI and tools like ChatGPT have become super popular virtually overnight. But have you considered the risks associated with using these tools, have you created policies for your employees, do you understand how your vendors may be adding risk to your business and are you managing that risk? Learn more here.