Cyber Security is a difficult practice to master. You may have components today but overlooking a few simple areas can come back and bite you in bad ways. This episode...
Security programs rely on user adoption and many times security projects are pushed back on from the changes they introduce. HR on the other hand seems to be able to...
We all have a Wi-Fi router in our homes but not everyone checks them regularly. Listen to the things you should review and why it's an important security routine you...
Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently....
Breaches occur more often than you realize, but they all aren't publicized. A service I use called Matchlight scans your personal information in the Dark Web and notifies you if...
With all the breaches that occur it's hard to keep track of them all. There's a website from a security professional that allows you to search your email address and...
We all have accounts on websites that we have long forgotten. Each one of those is a potential security risk for you left untouched. How can you keep your security...
The next Critical Security Control is number 2, Inventory of Software. What is it? How would you go about implementing this and what are they ways it could be exploited?...
When you travel you need a pass to get through security and to your seat. Those little slips of paper could be very dangerous to your private information. Don't be...
Insider threats are just a big a concern for security teams as the outside word. How do you reduce the insider threats? Why is a challenge? This episode I talk...