Similar Posts
What is Required for CMMC Level 1 Compliance?
Over the last couple of years we have talked a lot about what is required for CMMC Level 2 certification, but a lot more companies will need to be CMMC Level 1 certified. What is required for this?
Cyber Insurance – Hard to Get, Harder to Keep
If you have tried to get cyber risk insurance recently, you know that it is a whole new world. After years of collecting premiums, insurance companies have had to write checks. A lot of checks. They don’t like that so much. As a result, premiums have gone up, coverage has gone down, underwriting has become…
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
Why Dark Web Monitoring Is Critical
The dark web is where most of the content is illegal and most of the traffic is about how to do illegal deeds. It is also where, for example, credentials to the Los Angeles School District network were available for sale prior to the ransomware attack on the district’s network earlier this month. Likely the…
Managing Insider Threat
Cyber insider threat is a significant issue. It comes in multiple flavors – accidental and malicious and can be caused by IT or by general users. While relatively rare compared to ransomware, it is more common than you might think. Learn about the problem here. Audio Video
Security Hanging by a PIN
The most important part of your digital security is protected, typically, by a 4 digit PIN, assuming it is protected at all. Learn what this resource is and why it is at risk. audio video