As noted by Camille Stewart, former senior advisor for cyber policy at the Department of Homeland Security, social issues and technological issues are intrinsically intertwined. An advanced cybersecurity workforce needs to be as diverse as the people it exists to protect. Currently, systemic racism, sexism, and the outward image that technology and particularly support functions…

Read More
NIST Cybersecurity Framework Profiles

We have previously gone over the NIST Framework Core and Implementation Tiers, and would now like to dive into the Framework Profiles. Profiles are an organization’s unique positioning of their business requirements; such as the size of the company, industry and vertical as well as their unique requirements such as; contractual obligations, objectives, risk tolerance,…

Read More
Don't Let Hackers Ruin Your Vacation!

You may be taking a vacation, but hackers are not. In fact, many hackers wait for times like this when security teams are likely to be short staffed because of vacations or holidays. Learn how to protect yourself and your company from a cyber attack while traveling.

Read More
SMBs Face a Perfect Storm for Cybersecurity

What is a Perfect Storm? Wikipedia describes a Perfect Storm as an event in which a rare combination of circumstances drastically aggravates the event.   In other words, a worst-case scenario.  Today Cybersecurity presents small businesses with a Perfect Storm as they try to protect their IT environments. Hackers are increasingly focusing on SMBs (43% of cyber…

Read More
Cybersecurity Starts With Your Employees

Your employees may be the most critical part of your cybersecurity strategy.  Up to 25% of data breaches are caused by employee “mistakes” (2018 Cost of a Data Breach Study by Ponemon).   It happens in even the largest companies. Human error was blamed in the Equifax breach of over 147 million consumer’s sensitive credit data.…

Read More