Cyber Security Budgeting for 2020
It is time to update our annual Cyber Security Budgeting advice. I just lead an exercise at a conference where folks had limited budgets and
It is time to update our annual Cyber Security Budgeting advice. I just lead an exercise at a conference where folks had limited budgets and
Checklist for Compliance In response to the increasing threats of cybercriminal activity and as an effort to protect Non-Public Information (NPI) held by entities under
Diet and exercise versus a pill. An ounce of prevention versus a pound of cure. Saving for expenses versus using credit cards. We all understand
Stop the Password Reset Insanity How much time does your IT department spend changing a user’s network and or email account passwords because they clicked
Cyber-Security Budgeting is a Layered Approach Cyber-Security is arguably the hottest market right now. Organizations are now willing to spend $$ now more than ever
What are the top things we have learned from performing 200+ security audits? 1. The “major issues” do not change Good security is good security,
What is Ransomware? Ransomware is a type of malicious software that prevents users from accessing their computer system or files until a sum of money
What is the difference between a Penetration Test and a Vulnerability Scan? Understanding the difference between a penetration test and a vulnerability scan is critical
Overview Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer or files. A subset of
1420 NW Vivion Road, STE 102
Kansas City, MO 64118
3000 Riverchase Galleria, STE 700
Birmingham, AL 35244