IT Asset Management Best Practices That Actually Stop Hackers [2020]

Do you know every device that is on your network? Many organizations will say they have a good idea. But do they really? On penetration tests, we regularly find devices that the organization being tested wasn’t aware were present. Here are 5 IT asset management best practices that you should follow ...

5 Cybersecurity Attacks Your SMB Must Prepare To Withstand (in 2020)

Can you think of any company or industry today that doesn’t use computers? It’s amazing isn’t it? Technology is changing the way that we do almost everything. But technological advances aren’t all rosey. As our companies and lives become more dependant on computers, we also become more vulnera...

Spear Phishing Attack Case Study: How I got Credentials and Bypassed 2FA in less than 6 hours

Today, I’m going to show you how we used a spear phishing attack to get a company’s vice president of compliance’s credentials and bypass Two Factor Authentication and get access to very sensitive company information. Of course, we did this during an authorized penetration test. We were able to comp...

What is Penetration Testing: Everything You’ll Want To Know [2020]

If your organization is serious about cybersecurity, you may already or be looking to have testing of your security programs performed. It’s one of the best ways to ensure that your defenses are working the way they are intended to. So, in today’s article, we’re going to discuss, W...

Antivirus vs Firewalls: Do you actually need both? [Updated 2020]

Are you trying to improve the cybersecurity of your SMB and trying to figure out which security controls you actually need? Then you’ll love today’s post. Because I am going to break down a misunderstanding that some people have. We’re going to talk about firewalls vs antivirus. And which do you act...

Cybersecurity For Small Business: Strategy You Can Actually Afford

Do you work in an IT department at a company with a limited security budget? Or are you the IT for a small company and trying to stretch the little money you have for IT to also cover security needs? Then you will love today’s post. Because I’m going to show you how to build out programs for c...

Windows 10 Encryption Strategies: The Definitive Guide [2020]

Are you ready for Windows 10 encryption strategies that you can implement in your organization to secure your data? If so, you’ll love this article. It’s a complete guide to encryption methodologies. Everything you need to know to drastically improve the security of your computers. Let&#...

7 Security Leaders Give [Amazing] Third Party Risk Management Tips

With the daily reports of large breaches and organization’s increasing dependence on other organizations for technology solutions, there is no question that third party risk management is becoming a topic that must be addressed. The problem is: There’s very little clear guidance on what ...

11 California Consumer Privacy Act Compliance Steps [2020 Checklist]

In this post, I’m going to show you things you should be doing to prepare to comply with the California Consumer Privacy Act. These are the exact steps that we are using with all of our compliance consulting clients in 2019. Let’s dive right in. 1. Figure out if your orga...

Top 17 Managed IT Services Companies in Charlotte NC (2020 Rankings)

If you’re looking for a list of the best managed IT services companies in Charlotte, NC, you’ve come to the right place. Here’s the deal: Most Charlotte IT service agency rankings are completely subjective. And they don’t take one very important thing into consideration &#821...

About SmartFix

We are a family owned business that provides fast, warrantied repairs for all your mobile devices.

Brooklyn Area

2307 Beverley Rd Brooklyn, New York 11226 United States

1000 101-454555
[email protected]

Store Hours
Mon - Sun 09:00 - 18:00

San Francisco Area

358 Battery Street, 6rd Floor San Francisco, CA 27111

1001 101-454555
[email protected]

Store Hours
Mon - Sun 09:00 - 18:00

121 Resources for you to:

Learn & Master Cyber Security
Send Me the PDF
close-link
Get the Exclusive Bonus
Privacy Checklists and My Favorite Resources

Get Instant Access! 
Your information will never be shared
close-link
LET'S FIGURE OUT HOW TO HELP YOU BECOME A CYBER HERO + FREE STUFF!

Reasons to Subscribe to the CyberX Email List:

 
CLICK HERE TO SUBSCRIBE

 1. Free Stuff 
You'll get instant access to free resources. 

 2. Content Tailored to You 
Over time, Ill get to learn more about you and deliver content that actually matters

 3. No Hype 
Just real content that's meant to make a difference. 
 

close-link

Download the PDF Version Of This Guide

Want to save this guide for later? I'll email you the PDF for free. 
 
DOWNLOAD THE FREE GUIDE
close-link

What security controls should you implement to be secure?


Take our security self-assessment and get customized advice that will walk you through how you can improve your organization's security and reduce the risk of breaches in less than 60 days. 

 
START THE ASSESSMENT

Takes 5 minutes
close-link

SAVE MY SPOT!