Category Cybersecurity

Security Faux Pas – Owning Up When You Make A Mistake

A company can have the best security controls in place, have a staff that is highly security-aware and have what they consider outstanding security practices in place and yet bad things can and do happen. Many times, security breaches are caused by malicious actors exploiting some unnoticed vulnerability in a running service or other infrastructure. These breaches happen without involving…

Getting a Grip on Your Personal Online Security

Happy New Year! As I began 2024, I spent a little time last weekend evaluating my online presence and personal security practices. I thought it would be worth sharing my perspective on how I manage my personal online accounts and access to those accounts. In doing this, maybe I can motivate you to make it a point to evaluate and…

What Is Security & How Much is Enough?

Cybersecurity seems to dominate our lives. So much of our lives are dependent upon the Internet as we use connected devices to manage our shopping, finances and communications. The amount of data consumed and copied worldwide in 2010 was about 2 zettabytes. The amount predicted for 2024 is 147 zettabytes – almost 7500% growth in 14 years! Data is an…

Developing a Security-First Mindset

In the advertising world, there is an acronym called TOMA. TOMA stands for Top-of-Mind Advertising or Top-of-Mind Awareness. This is defined by Marketing Metrics as “the first brand that comes to when a customer is asked an unprompted question about a product or service category.” This can be thought of as the most remembered or most recalled brand names. A…

Importance of Asset Management in Organizational Security

Organizations must take risks in order to operate. Each organization determines what level of risk is acceptable to that organization. This concept is known as risk appetite. Security is the process of examining risk across an organization and taking defined steps to reduce those risks to a level that is acceptable to the organization. Security is NOT the act of…

The Importance of Personal & Corporate Cybersecurity Hygiene

We care for our bodies. We eat. sleep, bathe, brush our teeth, wash our clothes, clean our homes and see doctors as needed in order to keep ourselves healthy. This concept of self-care we call personal hygiene. We practice personal hygiene throughout our lives in hopes of having a long and healthy life. Many of us have pets that bring…

Proper Password Management

Possibly one of the most poorly understood and overlooked problems faced by businesses and consumers is the proper implementation and management of passwords. Typically, access is granted to a system or resource simply by entering a username and password. Usernames are typically email addresses or some combination of the user’s first and last name, so these are easy to guess.…