Risk Management has a purpose within a security program. One of those is not to be used as your excuse to not do something. Accepting risk because lack of funds...
Moving on in the CIS Top 20 the next up is number 4. Continuous Vulnerability Assessments. Monitoring your environment and systems for holes is a critical aspect of any security...
Internet of Things is a craze to get everything on the Internet. However the rush to build has left security practices behind. Time and time again it's shown that IoT...
Cyber Security is a difficult practice to master. You may have components today but overlooking a few simple areas can come back and bite you in bad ways. This episode...
Security programs rely on user adoption and many times security projects are pushed back on from the changes they introduce. HR on the other hand seems to be able to...
We all have a Wi-Fi router in our homes but not everyone checks them regularly. Listen to the things you should review and why it's an important security routine you...
Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently....
Breaches occur more often than you realize, but they all aren't publicized. A service I use called Matchlight scans your personal information in the Dark Web and notifies you if...
With all the breaches that occur it's hard to keep track of them all. There's a website from a security professional that allows you to search your email address and...
We all have accounts on websites that we have long forgotten. Each one of those is a potential security risk for you left untouched. How can you keep your security...