What’s my weight got to do with Cyber Security?
Our company graciously provides first-class health coverage to team members and their families. One aspect of our health plan is the opportunity for each member to have an annual check up. As I have gotten older (and wiser, I hope), I have taken advantage of this perk in hopes of getting an early jump on […]
I’m probably already in your network, and you don’t even know it
Can I get in your network? You betcha I can. As a matter of fact, there’s a good chance I’m already there. Now, here’s the really fun part: you let me in.
5 Easy Steps to Creating Complex Passwords that are Easy to Remember but Hard to Hack
Recently, Splash Data released a list of the 25 worst passwords for 2013. It contained all the usual suspects for “so easy to hack as to be utterly useless.” Many people continue live a fantasy life of protection by relying on 1111, 1234, or “password” to secure their most valuable information with a password that a 5th grader could crack in less than 10 seconds. Here’s an easy way to create a complex password that is unique to every website or application and dramatically increases your personal security by exponentially increasing the difficulty of hacking your information.
How a $5 cup of coffee could cost your company $10,000+ dollars
We’ve all been there. Racing between appointments, suddenly realizing that you forgot to send one of your best clients an important document that needs to arrive within 10 minutes. Being the super resourceful all-star executive (although sometimes forgetful), you stop off at your local coffee shop, order your mocha latte and quickly connect your laptop […]
Risk Assessment: What is it and why does my organization need it?
Consider a Risk Assessment like checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would never consider leaving those doors and windows open. But beyond the entryways that are easy to see, are there other access points that are not so obvious? Is […]
Penetration Testing Demystified
If you’ve been considering the various technical security assessments available to your organization, then chances are good you’ve heard of a Penetration Test, but do you know whether you need an internal or an external penetration test? How often should these tests be scheduled? What can you expect the test to find?
Qualifying a Business Contiunity Planning Firm
When searching for the right Business Continuity Planning (BCP) firm, there are several important factors that should be taken into consideration–not the least of which are location, experience, and support structure. It is important to know that the expectations of your organization will be met, if not exceeded, and that the firm will educate you […]
Choosing the Right Security Assessment
Navigating the various types of Security Assessments and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding the available services and defining your organization’s needs at the beginning can help you get started on the right foot, which will ultimately save both time and money.