Blog

Asset Inventory is Key to Strong Cybersecurity

Introduction The Center of Internet Security (CIS), www.cisecurity.org, is a nonprofit that publishes globally recognized best practices for securing IT systems and data. CIS released its latest security controls, CIS Critical Security Controls version 8.1, in August 2024. Since the controls are in priority order, let’s look at the first control, Inventory, and Control of Enterprise Assets.

Read More
Life Hack: Creating Unforgettable Passwords

Passwords can be frustrating, but this formula helps create secure, unique, and unforgettable passwords. Choose a meaningful phrase, create a base word from its first letters, and add specific extensions for each website. This ensures strong security and an easy to remember password.

Read More
Social Engineering Attacks and How to Secure Your Business

Acknowledging that your business might be vulnerable to social engineering is the first step toward securing it. As a leader, you have a unique view of how people, processes, and systems interact daily. Unfortunately, even the strongest technical defenses can be overcome by hacking the human… meaning human manipulation. This is where social engineering comes

Read More
How to Survive the National Data Breach

The nearly 2.7 billion leaked records – which notably include hundreds of millions of Americans’ social security numbers – first showed up for sale in criminal communities in April from a threat actor called USDoD. The dataset resurfaced again on August 6, this time with the data posted to Breach Forums for free, for anyone to download.

Read More
Master of Your SOC: Are you asking your data the right questions?

The Story So there I was… watching a new cyber security analyst who was sitting in front of his computer clicking on buttons and menus on his screen.  He didn’t seem to be getting anywhere so after about 10 minutes I asked, “Hey, what are you looking for?”  “I have no idea,” he said.  Maybe

Read More