Similar Posts
The Risk of BYOD – Non-Managed Devices
Many companies allow, encourage and/or require employees to use personally owned devices. While it seems that, at least in the short term, this is a money saving and morale boosting move, in the long term, it may be an existential threat to the company. In this post we are going to use one company who…
Lessons to Learn from the MGM-Caesars Breach
The breaches of both MGM and Caesars were not high tech; they were pure social engineering attacks. That means that you can harden your company and your information likely for very little money. While this is early in the game, there are some easy lessons to learn here. Here are some key takeaways from the…
Staying Safe Online – Passwords
I see a lot of advice on passwords but unfortunately, some of it is wrong. Watch this short video to learn about managing your passwords.
Managing Insider Threat
Cyber insider threat is a significant issue. It comes in multiple flavors – accidental and malicious and can be caused by IT or by general users. While relatively rare compared to ransomware, it is more common than you might think. Learn about the problem here. Audio Video
NIST SP 800-171 Update for July 2023
800-171 is the government’s chosen cybersecurity standard for protecting controlled unclassified information (CUI) and is the standard is required by a number of government departments and by private industry as a matter of contract for protecting sensitive unclassified information. Learn more about this new version of the standard here.
Cryptocurrency is Ripe for Cyberattacks
Cryptocurrency is basically a very sophisticated IT infrastructure. One that is not regulated very much and one which can have devastating financial impact to people if it is compromised. And it is being compromised daily. Don’t bring a spoon to a fork fight – learn what some of the risks are so you can better…