If you are wanting to learn more about exactly what is zero trust, you’ve come to the right place. In this all-new guide, you’ll learn about: Failures of modern security techniques Zero Trust Principles The process for implementation Lots more So, if you want to make sure that you understand zero ...
We analyzed 2,700 healthcare data breaches to answer the question: Where should healthcare organizations focus their security efforts to prevent data breaches? We looked at breach sizes. We looked at the cause of the breach. We even looked at who reported the breach. We uncovered a number of interes...
Are you trying to improve the cybersecurity of your SMB and trying to figure out which security controls you actually need? Then you’ll love today’s post. Because I am going to break down a misunderstanding that some people have. We’re going to talk about firewalls vs antivirus. And which do you act...
In this post, I’m going to show you how you can make your network more resilient to attacks like ransomware. In fact, you can stop hackers dead in their tracks. We’re going to discuss network segmentation. So, what is network segmentation? Network segmentation is an approach for divid...
Are you looking for a cybersecurity plan for a small business? One that is actually affordable and keeps out the hackers? Then you will love today’s post. Because I’m going to show you how you can build out an affordable but highly effective a small business cybersecurity program. ...
Today, I am going to show you a method that you can use to build a highly successful security program in under 30 minutes a day – the calendar carving method. This is a process that will help you be hyper-focused on achieving your security goals. The cybersecurity problem ...
The information security space is quite a disaster. We have data breaches being disclosed constantly; and half of the time these breaches could have been easily avoided. Then, we hear statistics about the talent shortage. They say that we’re over a million professionals short, yet when you ask anyon...
If you feel like your IT team is overwhelmed and lacking time to really focus on your security needs, you are not alone. In fact, most organizations feel this exact same way. That’s why it is often necessary to outsource some of your security tasks. Let’s talk about managed security as a service and...
Did you know that 14.5 billion spam emails are sent every single day? Want to know how you can help stop this? I’m going to show you how you can implement SPF, DKIM and DMARC controls for your email. This will stop attackers from using your email while cutting down on the spam you receive. Let’s get...
In this post, we’re going to look at some of the basics of cybersecurity that some people are forgetting. When most people hear anything about cybersecurity, they think of encryption and locking down systems so hackers can’t steal data. But there’s much more to security than keeping bad guys out. ...