Zero Trust as Learned from My Grandmother
by CJ Hurd on February 2, 2022 at 3:00 PM
I have a line I use with my kids (mainly my teenagers, not so much my nine-year-old yet); “I trust you until I don’t”. They know the line well and sometimes will even finish it for me. I have raised them to hopefully make good decisions and to tell the truth, with the idea of keeping …
Elements of Quality Security and Privacy Awareness Training
by Patrick Hughes on September 3, 2020 at 3:00 PM
As information technology professionals, we often hear the term security awareness training. Most organizations know they need to be conducting continuous security awareness training, whether the goal is to check a box for a framework/regulation they must adhere to, or they genuinely …
Security Culture Through the Eyes of a Young Marine
by Ron Scarborough on May 27, 2020 at 1:00 PM
Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …
9 Easy Steps to Create Strong Passwords
by Nicholas Foisy on April 15, 2020 at 4:30 PM
Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.
Lessons Learned from a Part-Time Teleworker in Quarantine
by Derek Boczenowski on March 31, 2020 at 1:00 PM
If you read our blog on a regular basis, you have seen more than one excellent discussion on pandemic planning and how to set up remote workers with proper policies, process, hardware, and software to ensure secure and compliant ways to keep working from home.
Grocery Stores – A Hidden Gem for Cyber Criminals?
by Nicholas Foisy on March 25, 2020 at 11:00 AM
Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …