Similar Posts
DoD’s New Instruction on Labelling Controlled Technical Information
Most defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.
Security of Network Devices with Public Management Interfaces
CISA, the Cybersecurity and Infrastructure Security Agency released a directive, which is binding on federal civilian executive branch agencies, that addresses the security of network and operational technology (OT, IoT) devices which can be managed from the public Internet. Learn what CISA and we are recommending below.
Lessons to Learn from the MGM-Caesars Breach
The breaches of both MGM and Caesars were not high tech; they were pure social engineering attacks. That means that you can harden your company and your information likely for very little money. While this is early in the game, there are some easy lessons to learn here. Here are some key takeaways from the…
What Should You Preserve When Employees Leave?
Employees come and go and 99% of the time it is innocuous. Occasionally companies get involved in lawsuits as well. Properly preserving evidence (or preserving it at all) can be the difference between finding out what you need or prevailing in a lawsuit. Are you prepared? Audio Video
Security Hanging by a PIN
The most important part of your digital security is protected, typically, by a 4 digit PIN, assuming it is protected at all. Learn what this resource is and why it is at risk. audio video
MFA Fatigue – What is it and How to Protect Yourself
MFA Fatigue is a relatively new attack method and is a way to try and get around MFA security. Learn what it is and how to protect yourself and your company against it, here. Audio Video