CISA Test Failed to Penetrate Local Government Network Defended by ThinkGard
Security assessments by the Cybersecurity and Infrastructure Security Agency (CISA) are the gold standard for validating cybersecurity effectiveness for government entities. These assessments mimic actions that threat actors might take…
Data Recovery isn’t always enough
Just because you can recover your data after ransomware doesn’t mean you won’t suffer losses. Let’s say your company lost its data but fortunately managed to get it all back.…
What’s Your Favorite User Credential Your Employees Give Up?
As an IT professional, you’ve got a sixth sense about scams that kicks in on social media. That’s why it’s probably frustrating to see your family and friends on social…
Ways to Avoid a Cyber Disaster from Your Remote Workforce
At the office, you’re able to set up security on your users’ laptops. But how about the computers your employees use at home? When browsing the internet, opening emails, and…
How Simple Tricks Can Bypass Your Cybersecurity Tools and Technology
A while back, a young salesperson at our company appeared to receive an email from an officer of the company that read: Britney, I need a huge favor and I…
USB Drives: Shiny Objects That Lead to Cybersecurity Headaches
It’s one of your many nightmares as an IT director. An employee is walking along and finds a flash drive in the company parking lot. They want to be a…
Security as a Service: Because You Never Planned on Being a Security Expert
More and more fully staffed IT departments are beginning to look at protecting their networks by moving to a Security as a Service model versus taking on the task themselves.…
Are You Complacent or Productively Paranoid?
Are You Complacent or Productively Paranoid? During the conferences and tradeshows where we’ve exhibited over the years, we meet many IT professionals from a variety of companies and industries. We…
When Penetration Testing creates “Bad Optics”
Recently, we’ve been seeing a steady number of RFPs for Cyber Security solutions roll in that not only request items such as email security, firewall and end point protection but…
Acceptance of Risk – Please Sign Here
So, I read a post on social media where a gentleman was asking if there was a risk management document out there that could be submitted to application owners, business…