Is a Cybersecurity Degree Worth It? Considering Pros & Cons
by Jeffrey Torrance on July 5, 2024 at 11:30 AM
The modern era has brought with it a heightened need for cybersecurity professionals to protect sensitive data and systems. With cyber threats constantly evolving, the demand for skilled cybersecurity experts is at an all-time high. This brings us to an important question: Is a cybers …
What Is a Whaling Attack? (With Examples)
by Jeffrey Torrance on April 25, 2024 at 5:21 PM
Cybercriminals deploy a wide variety of techniques to target both individuals and organizations, aiming to extract sensitive information. With numerous social engineering strategies at play, many are curious to know, "what is whale phishing?" Whaling attacks, often referred to as CEO …
Making Sense of Data Management
by Jeffrey Torrance on February 9, 2023 at 2:45 PM
Organizations face a prevalence of both internal and external cyber threats. This makes data management one of the most critical components in an organization’s cybersecurity program. From classifying data, to ensuring it is handled with the appropriate security precautions, to ensuri …
Weighing Your Multi-Factor Authentication Options
by Jeffrey Torrance on April 14, 2022 at 2:30 AM
At this point most of us have heard that securing our accounts with only passwords, no matter how complex, is not enough. Do not get me wrong, requiring strong passwords (14 or more characters, composed of uppercase and lowercase letters, and including symbols and numbers) is essentia …
Center for Internet Security (CIS) Controls V8 – What's New?
by Jeffrey Torrance on August 5, 2021 at 4:00 PM
With the advent of the novel Coronavirus and the subsequent lockdowns, companies were forced to innovate on how and where they did work. The workforce shifted from the familiar physical and logical boundaries of corporate offices to home offices that provided greater flexibility but a …