The Definitive Small Business Cybersecurity Plan [Effective in 2020]

Are you looking for a cybersecurity plan for a small business? One that is actually affordable and keeps out the hackers? Then you will love today’s post. Because I’m going to show you how you can build out an affordable but highly effective a small business cybersecurity program. ...

Calendar Carving Method

Today, I am going to show you a method that you can use to build a highly successful security program in under 30 minutes a day – the calendar carving method. This is a process that will help you be hyper-focused on achieving your security goals. The cybersecurity problem ...

Rethinking InfoSec (Book Review)

The information security space is quite a disaster. We have data breaches being disclosed constantly; and half of the time these breaches could have been easily avoided. Then, we hear statistics about the talent shortage. They say that we’re over a million professionals short, yet when you ask anyon...

Managed Security As A Service

If you feel like your IT team is overwhelmed and lacking time to really focus on your security needs, you are not alone. In fact, most organizations feel this exact same way. That’s why it is often necessary to outsource some of your security tasks. Let’s talk about managed security as a service and...


Did you know that 14.5 billion spam emails are sent every single day? Want to know how you can help stop this? I’m going to show you how you can implement SPF, DKIM and DMARC controls for your email. This will stop attackers from using your email while cutting down on the spam you receive. Let’s get...

Basics of Cybersecurity

In this post, we’re going to look at some of the basics of cybersecurity that some people are forgetting. When most people hear anything about cybersecurity, they think of encryption and locking down systems so hackers can’t steal data. But there’s much more to security than keeping bad guys out. ...

IT Asset Management Best Practices That Actually Stop Hackers [2020]

Do you know every device that is on your network? Many organizations will say they have a good idea. But do they really? On penetration tests, we regularly find devices that the organization being tested wasn’t aware were present. Here are 5 IT asset management best practices that you should follow ...

5 Cybersecurity Attacks Your SMB Must Prepare To Withstand (in 2020)

Can you think of any company or industry today that doesn’t use computers? It’s amazing isn’t it? Technology is changing the way that we do almost everything. But technological advances aren’t all rosey. As our companies and lives become more dependant on computers, we also become more vulnera...

Spear Phishing Attack Case Study: How I got Credentials and Bypassed 2FA in less than 6 hours

Today, I’m going to show you how we used a spear phishing attack to get a company’s vice president of compliance’s credentials and bypass Two Factor Authentication and get access to very sensitive company information. Of course, we did this during an authorized penetration test. We were able to comp...

What is Penetration Testing: Everything You’ll Want To Know [2020]

If your organization is serious about cybersecurity, you may already or be looking to have testing of your security programs performed. It’s one of the best ways to ensure that your defenses are working the way they are intended to. So, in today’s article, we’re going to discuss, W...

About SmartFix

We are a family owned business that provides fast, warrantied repairs for all your mobile devices.

Brooklyn Area

2307 Beverley Rd Brooklyn, New York 11226 United States

1000 101-454555
[email protected]

Store Hours
Mon - Sun 09:00 - 18:00

San Francisco Area

358 Battery Street, 6rd Floor San Francisco, CA 27111

1001 101-454555
[email protected]

Store Hours
Mon - Sun 09:00 - 18:00

121 Resources for you to:

Learn & Master Cyber Security
Send Me the PDF

Get Instant Access! 
Your information will never be shared

Reasons to Subscribe to the CyberX Email List:


 1. Free Stuff 
You'll get instant access to free resources. 

 2. Content Tailored to You 
Over time, Ill get to learn more about you and deliver content that actually matters

 3. No Hype 
Just real content that's meant to make a difference. 


Download the PDF Version Of This Guide

Want to save this guide for later? I'll email you the PDF for free. 

What security controls should you implement to be secure?

Take our security self-assessment and get customized advice that will walk you through how you can improve your organization's security and reduce the risk of breaches in less than 60 days. 


Takes 5 minutes