According to the security software specialists at CheckPoint, mobile security has become a huge problem over the past...
Know Your Enemy: The State of Ransomware in 2021
I recently came across a report from the security firm Sophos, describing the state of ransomware in 2021. Here is a...
Manage Cybersecurity for What It Is: A Risk Problem
I read a Forbes article today with an interesting message: manage cybersecurity the way you would manage risk. I could...
5 Security Strategies for the New Hybrid Workplace
Businesses have had to make massive adjustments to the way they function over the past year. And the pandemic has most...
3 New Advanced Phishing Attacks to Look Out For
My colleagues and I have written about various phishing techniques over the past couple of years, and the clues to...
Make Your Security Policies Work for You
Do your security policies work for you? Or do you have a love-hate relationship with them? As in, people love to hate...
Patch Your Exchange Server Now. But Don’t Stop There.
As luck would have it, I was putting together a proposal last week to help a non-profit. The organization was coming...
Say Goodbye to Passwords With Microsoft’s Zero Trust Strategy
Well, we’ve survived a year in a pandemic and we’ve had to adapt the way we work in significant ways. At the same...
Investigate and Remediate Threats with Zero Trust
Congratulations! We have made it to the top of our Zero Trust stack. Today I am going to cover the steps you can take...
Secure Your Network with Zero Trust
We are closing in on the end of our Zero Trust journey. (For some of you, that cannot happen soon enough!) In this...
Use Zero Trust to Secure Your Infrastructure
Secure your infrastructure. If you have been reading my posts on installing a Zero Trust security framework… Thank...
Five Best Practices for Cloud Security
Cybersecurity practices for organizations using the cloud should be implemented differently than for those who do not....
More on Securing Your Phone
We wrote a post back in 2018 (seems like forever ago!) on securing your phone while traveling abroad (remember...
Plan to Secure Your Data with Zero Trust
This week we return to the topic of a Zero Trust security implementation. So far, I have covered how to secure your...
Top Cybersecurity Challenges and Priorities for 2021
Yes, 2020 was a real doozy. Because of the pandemic, organizations worldwide were caught off-guard by mandatory...
Cybersecurity Drills: 6 Reasons They’re Worth It
We all know from recent headlines that not even the largest of organizations is immune to a cyber-attack. But we also...
Secure Your Apps with Zero Trust in Mind
I have been writing about the Zero Trust security model and how to apply it in your organization. We tackled the first...
The COVID-19 Vaccine is Here. And So Are the Phishing Scams
It was pretty predictable: With all of the hoopla around the COVID-19 vaccine, there would most certainly be the...