Risk Prevention
Removable Storage Device Encryption
To prevent the loss of private data, it is recommended to either block external drives from use or enforce their encryption. If, for example, …
The Importance of Device Decommissioning
Your firm’s Cyber Program or Written Information Security Policy (WISP) should include a procedure for decommissioning devices when they will no longer be used. …
Zero Trust 4/4: Networks
A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers networks. Implementation of security policies is …
Zero Trust 3/4: Software
A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers software. Zero Trust software is …
Zero Trust 2/4: Endpoints
A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers endpoints. Any device used to …
Zero Trust 1/4: Users
A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers users. Do you know who …
Managed Is Most Secure
For endpoint protection, you could provide instructions to your users or your IT team to manually configure settings (complex password, screen saver, personal firewall, etc.) …
Ransomware Protection
Ransomware incidents are up 300% in the past year and remain a top cyber threat as attacks continue to surge against the financial sector. Implementing …
Cybersecurity Risk Assessment
As firms face an increased rate of sophisticated cyberattacks, there is no better time to execute a Cybersecurity Risk Assessment. Proactive vulnerability scans and network …
Beware of Phishing
Phishing remains a leading cybersecurity threat as cybercriminals use increasingly sophisticated tactics to obtain private data by exploiting human behavior. Posing as a known contact …
Ensure Encryption
Encryption is a vital cybersecurity safeguard that protects data while at rest on your device and in transit across a network. Made possible by cryptography, …
Hybrid Workforce Cybersecurity
Especially given the last year, we must stop segregating home, traveler, and office users and instead treat all users the same way. The high-level of …
Reboot Your Computer
One critical but simple action to significantly improve cybersecurity & system performance is routine System Reboot. As a best practice and as required by some …
Vendor Risk Management
The best way to minimize risk when working with a vendor that handles your private data in providing service to you is to perform Vendor …
Cost vs Benefits
Data Breaches are costly. Did you know that 60% of firms go out of business within 6 months of experiencing a breach? Damage ranging from …
Smartphone Security
Think you’re saving money on your Smartphone data plan by utilizing free WiFi? Think again. Smartphone data is most secure when kept within your provider’s …
Dark Web Data
Your private data or user credentials could be for sale on the dark web right now put there by cybercriminals who work around the clock …
Video Conferencing Best Practices
Video Conferencing software is an excellent tool for virtual meetings while working remotely from home or traveling. To ensure that video conferences are as secure …
Cybersecurity Insurance
Having Cybersecurity Insurance does not guarantee payout in the event of a claim. In fact, a cybersecurity claim could be denied from the outset if …
Cybersecurity Risk Assessment
Are you a seller ready to exit or gain momentum by joining a bigger firm? Are you a buyer ready to acquire a successful firm …
Printers and scanners
Printers and scanners are often forgotten devices that are important for your firm’s cybersecurity. Did you know there’s a feature on some printers or scanners …
The Dark Web
The Dark Web is a hidden part of the internet used for illicit purposes. Hackers put stolen credentials up there for sale. A password prefix …
Use of a complex username diminishes risk of malicious algorithms
When a username is created properly it serves as additional security. Use of a complex username diminishes risk of malicious algorithms being able to predict …