Similar Posts
Cyber Insurance – Hard to Get, Harder to Keep
If you have tried to get cyber risk insurance recently, you know that it is a whole new world. After years of collecting premiums, insurance companies have had to write checks. A lot of checks. They don’t like that so much. As a result, premiums have gone up, coverage has gone down, underwriting has become…
What is Required for CMMC Level 1 Compliance?
Over the last couple of years we have talked a lot about what is required for CMMC Level 2 certification, but a lot more companies will need to be CMMC Level 1 certified. What is required for this?
Will You be the Last to Know?
External attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…
Disaster Recovery for Password Managers and MFA apps
Many of us use password managers and some of us use multi-factor authentication apps and, in many cases, that app lives on your phone. But what happens if your phone breaks, gets dropped in the toilet or run over by your car? What do you do then? I learned some things today and have some…
Do You Have the Right Backups?
In light of recent events here in Colorado, now would be a good time to make sure you are backing up all of your information. In the case in Colorado, the Marshall fire destroyed over a thousand homes and damaged several hundred others in the middle of suburbia in less than a day. None of…
Staying Safe Online – Passwords
I see a lot of advice on passwords but unfortunately, some of it is wrong. Watch this short video to learn about managing your passwords.