Four Steps to Effective Cybersecurity Logging

Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company […]

Full Details

Four Steps to Patch Management Success

The need for patch management has repeatedly been demonstrated in recent years as companies large and small suffered data breaches […]

Full Details

4 questions to ask before launching a data protection strategy

The process of making sure your business is prepared to protect its data from ransomware and other disasters depends largely on the […]

Full Details

GDPR Compliance in the Cloud

With the upcoming onset of the GDPR, many companies are seeking to leverage their cloud services for GDPR compliance. Companies […]

Full Details

Important considerations for your business and GDPR

The General Data Protection Regulation (GDPR) is the latest in a host of rules designed to protect privacy.  It is […]

Full Details

How to create a BYOD policy that keeps your business data secure

Bring your own device (BYOD) policies are commonplace in many organizations today. Employees bring in their personal cell phones, laptops, […]

Full Details

The case for consistency in security

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” […]

Full Details

The 5 W’s of data identification and inventory

I always figured that you would need to know what you have in order to protect it. However, I have […]

Full Details

The five stages of cybersecurity maturity

As an organization becomes more conscious and engaged in protecting information, it progresses along a path of security maturity. I […]

Full Details

Third party information request policies

The Electronic Frontier Foundation issued a report on 18 web and technology companies that routinely handle data.  The study looked […]

Full Details

Ineffective Security Policy Adherence Results in Another Data Breach

The Florida Department of Juvenile Justice (DJJ) had a mobile device containing 100,000 youth and employee records stolen on January […]

Full Details

Presidential cybersecurity order on information sharing and cooperation

President Obama signed an executive order on February 12, 2013, that requires federal agencies to share information on cyber threats […]

Full Details

Small healthcare data breaches can result in significant fines

On January 2, 2013, the Department of Health and Human Services (HHS) fined the Hospice of North Idaho $50,000 for […]

Full Details

Large government breach shakes confidence in state security

On October 10, the Secret Service’s electronic crimes task force discovered that the South Carolina Department of Revenue’s systems were […]

Full Details

Cybersecurity plans and legislation

Last month, Senator John D. Rockefeller IV, Chairman of the U.S. Senate Committee on Commerce, Science and Transportation, sent the […]

Full Details
Data Classification

Achieving the Benefits of Data Classification on a Budget

Data classification is a term that is not usually associated with the small business.  It tends to invoke thoughts of […]

Full Details

Environmentally Conscious Security: Painting Information Security Green

Historically, ecological concerns have been significant drivers for change.  Topics ranging from global warming to protecting various species carry a […]

Full Details

Effective Data Retention

Organizations are accumulating data at a pace that would cause a hoarder to blush.  Just like that old bicycle seat […]

Full Details

Security Focus at the Corporate Board Level

Imagine a boardroom a generation ago.  Smoke fills the air, and sidebar discussions thrive while the board members wait for […]

Full Details

Security Awareness Training Tips for Detecting Malicious Software

We have worked hard to educate users of the need for computer hygiene, using anti-spyware, multiple browsers, data backups, and […]

Full Details

Leveraging Vulnerability Scoring in Prioritizing Remediation

The average organization has numerous types of equipment from different vendors. Along with the equipment, businesses also utilize multiple software […]

Full Details

Achieving High Availability with Change Management

Change management is a key information security component of maintaining high availability systems. Change management involves requesting, approving, validating, and […]

Full Details

Guidelines for Username and Password Risk Management

Hackers often bypass some of the best security technologies by exploiting one of the oldest tricks in the book, your […]

Full Details

The Essential Link between Awareness and Security Policies

Information security policies and security awareness go hand in hand. Frankly, a policy is worthless if it sits on someone’s desk. […]

Full Details

Developing a Virtualization Security Policy

Since many organizations are rapidly virtualizing servers and even desktops, there needs to be direction and guidance from top management […]

Full Details

Are cybersecurity policies valuable or just stacks of paper?

Security policies and security awareness go hand in hand.  Frankly, a policy is worthless if it sits in someone’s desk.  […]

Full Details

Gas Station Terrorists

The Patriot Act allows the government to classify unruly activity by passengers on airlines as acts of terrorism. Some individuals […]

Full Details

The Motivation Mix: Different Strategies for Fostering Positive Security

For cybersecurity teams to achieve their goal of securing information and systems, they must motivate their staff.  Motivation is what […]

Full Details