Category Archives: Cybersecurity

Rogue WAN – The Galactic Data Breach

A long time ago, in a galaxy far, far away.. The War of the Clones have raged across the known galaxy for years.  Now, there are fears that Separatists are building a super weapon. A battle station is under construction by team of scientists and engineers. This battle station is the Death Star. Planet Scarif Data […]

The Top 10 Things You Need For Remote Work

It seems like everyone is working from home in some fashion these days.  Whether it’s all day every day or a few days a week, here are the top 10 things you need for remote work. These 10 things are what you need for a productive, efficient and safe remote work environment.   Getting Comfortable […]

Cybersecurity is a Business Decision

Cybersecurity is a Business Decision

Cybersecurity is a Business Decision Process, Not an IT Problem  Last year, Gartner, a research and advisory group, published an article about treating cybersecurity as a business decision rather than an IT problem (ID G00466055).  The article is long, so the TLDR version is that most companies are asking the wrong questions about cybersecurity, which leads to bad investments.  Due […]

working securely from home

Working Securely From Home

The Work From Home Exodus As COVID-19 continues to spread, many businesses are assessing how they can prioritize employee safety and still maintain regular business operations.  One solution many businesses are turning to is recommending employees to work from home to avoid potential illnesses. To help ease the burden on businesses, many companies are providing […]

Who Plans for a Pandemic? Work from Home Strategies for the New Normal

Who Plans for a Pandemic? Work from Home Strategies for the New Normal With the outbreak of COVID-19 and now the worldwide spread of the virus, we are all still working from somewhere.  For most of us it’s at home, or at a relative safe distance from each other.  No one planned for this pandemic, […]

National Clean Out Your Computer Day

National Clean Out Your Computer Day There’s a day for everything anymore and today is no exception.  Did you know it’s National Cleanout Your Computer Day?  Not exactly the best holiday, but IT people everywhere will rejoice if you join us in celebrating and cleanout your PC. Cleaning out your pc is a lot like […]

Password Management Option for Your Business

What are my options for Password Management? Millions of accounts get compromised or hacked every day. Some are large scale hacks where they are going after user lists for extortion or fraud.  Some are more ingenious, like the people who go after Google accounts for the passwords people store in Chrome.  Most often it’s an […]

Insider Threat – What it can look like

Insider Threats Imagine you’ve brought on an intern, temp or contractor as part of your marketing team.  Imagine his name is Noah.  Noah has actually been brought in by the CISO, unbeknownst to marketing.  Marketing thinks they are getting a new contractor.  The CISO wants to test how protected the company is from an Insider Threat.  […]

How To Protect Your Mobile Devices

How To Protect Your Mobile Devices Every year, an obscene number of mobile devices are stolen and lost; however, the exact number of devices suffering from these fates is up for debate. We casually leave our phones and tablets in shopping carts, public restrooms, and on top of restaurant tables.  Sometimes they grow legs and jump […]