Cybersecurity Controls – Good, Cheap, Fast: Pick Two
by Mick Fitton on June 22, 2023 at 3:15 PM
Nearly twenty years ago, I was working for the public transportation department in the town where I went to school. It was there that I was introduced to the new Marketing Director, who was among the first MBAs I had met. He laid something on me that was novel to me at the time but I …
Businesses Can Learn From the Classified Pentagon Leak
by Jake Dwares on April 14, 2023 at 4:30 PM
On April 14th, 2023, 21-year-old Massachusetts Air National Guardsman Jack Teixeira appeared in federal court, accused of leaking classified documents in a Discord group titled “Thug Shaker Central”. Facing charges under the 1917 Espionage Act, Jack is looking at potential decades in …
Only YOU Can Prevent Cyberattacks This October (And Beyond)
by Brian Kelly on October 13, 2022 at 4:30 PM
Some of you may be old enough to remember Smokey the Bear. Created in 1944, the Smokey Bear Wildfire Prevention campaign is the longest-running public service advertising campaign in U.S. history. In 1947, Smokey’s slogan became "Remember... Only YOU Can Prevent Forest Fires".
Access Control to Combat Domestic and Global Threats
by Bryan Borrayo on August 4, 2022 at 1:00 PM
By now, most cybersecurity professionals have heard of the term access control. Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. Access control is comprised of two main components: authentication …
Cybersecurity Controls & Configurations – Are You Locking Your Doors?
by Geoff Yeagley on July 20, 2022 at 3:15 PM
Summertime is the peak time for people to go on vacation. The kids are off from school and the weather is finally nice in most of the country. When you go on vacation, no matter how far you travel, there are certain precautions that you take to ensure that your home is safe while you …
Password Complexity – Going Beyond the Minimum Requirements
by Peter Fellini on February 23, 2022 at 1:00 PM
As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …