Risk Prevention

Cyber Bites

Removable Storage Device Encryption

To prevent the loss of private data, it is recommended to either block external drives from use or enforce their encryption.   If, for example, ...
More
Cyber Bites

The Importance of Device Decommissioning

Your firm’s Cyber Program or Written Information Security Policy (WISP) should include a procedure for decommissioning devices when they will no longer be used.   ...
More
Network Security Cyber Bites

Zero Trust 4/4: Networks

A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers networks. Implementation of security policies is ...
More
Cyber Bites

Zero Trust 3/4: Software

A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers software.   Zero Trust software is ...
More
Cyber Bites

Zero Trust 2/4: Endpoints

A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers endpoints.   Any device used to ...
More
Cyber Bites

Zero Trust 1/4: Users

A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers users.   Do you know who ...
More
Cyber Bites

Managed Is Most Secure

For endpoint protection, you could provide instructions to your users or your IT team to manually configure settings (complex password, screen saver, personal firewall, etc.) ...
More
Cyber Bites

Ransomware Protection

Ransomware incidents are up 300% in the past year and remain a top cyber threat as attacks continue to surge against the financial sector. Implementing ...
More
Cyber Bites

Cybersecurity Risk Assessment

As firms face an increased rate of sophisticated cyberattacks, there is no better time to execute a Cybersecurity Risk Assessment. Proactive vulnerability scans and network ...
More
Cyber Bites

Beware of Phishing

Phishing remains a leading cybersecurity threat as cybercriminals use increasingly sophisticated tactics to obtain private data by exploiting human behavior. Posing as a known contact ...
More
Cyber Bites

Ensure Encryption

Encryption is a vital cybersecurity safeguard that protects data while at rest on your device and in transit across a network. Made possible by cryptography, ...
More
Cyber Bites

Hybrid Workforce Cybersecurity

Especially given the last year, we must stop segregating home, traveler, and office users and instead treat all users the same way. The high-level of ...
More
Cyber Bites

Reboot Your Computer

One critical but simple action to significantly improve cybersecurity & system performance is routine System Reboot. As a best practice and as required by some ...
More
Cyber Bites

Vendor Risk Management

The best way to minimize risk when working with a vendor that handles your private data in providing service to you is to perform Vendor ...
More
Cyber Bites

Cost vs Benefits

Data Breaches are costly. Did you know that 60% of firms go out of business within 6 months of experiencing a breach? Damage ranging from ...
More
Network Security Cyber Bites

Smartphone Security

Think you’re saving money on your Smartphone data plan by utilizing free WiFi? Think again. Smartphone data is most secure when kept within your provider’s ...
More
Cyber Bites

Dark Web Data

Your private data or user credentials could be for sale on the dark web right now put there by cybercriminals who work around the clock ...
More
Cyber Bites

Video Conferencing Best Practices

Video Conferencing software is an excellent tool for virtual meetings while working remotely from home or traveling. To ensure that video conferences are as secure ...
More
Cyber Bites

Cybersecurity Insurance

Having Cybersecurity Insurance does not guarantee payout in the event of a claim. In fact, a cybersecurity claim could be denied from the outset if ...
More
Cyber Bites

Cybersecurity Risk Assessment

Are you a seller ready to exit or gain momentum by joining a bigger firm? Are you a buyer ready to acquire a successful firm ...
More
Cyber Bites

Printers and scanners

Printers and scanners are often forgotten devices that are important for your firm’s cybersecurity. Did you know there’s a feature on some printers or scanners ...
More
Cyber Bites

The Dark Web

The Dark Web is a hidden part of the internet used for illicit purposes. Hackers put stolen credentials up there for sale. A password prefix ...
More
Cyber Bites

Use of a complex username diminishes risk of malicious algorithms

When a username is created properly it serves as additional security. Use of a complex username diminishes risk of malicious algorithms being able to predict ...
More