Category

Cybersecurity
“Seeing Yourself in Cyber”  Since the 2004 declaration by the President of the United States and Congress, we dedicate each October as Cybersecurity Awareness Month. The annual campaign is sponsored through a conjoined effort between the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) — providing support from both the federal...
Read More
The Guide to Risk Management and Cybersecurity Assessments   The idea of understanding your cybersecurity risks, program, threats, and potential impacts seems like an obvious item on a business leader’s to-do list — yet often only done when a firm needs to “check a box” for compliance purposes. A proper assessment and analysis is the first...
Read More
Enforcing best security practices through governance and formal procedures  Similar to how firms use employee handbooks to outline all the requirements and expectations for professionalism in the workplace, businesses should also implement rules for how users of company resources and applications must act and operate as it pertains to the company’s data security. Hence, the...
Read More
On September 22nd, 2022, the Crowdstrike Fal.Con cybersecurity conference concluded — providing numerous seminars and industry updates to security practitioners on solutions to enhance organizational security postures, identify risks, and fully understand some of today’s lingering threats.   Our CEO and founder Delta Munoz attended this conference and came back with tremendous insights to incorporate into...
Read More
In 1996, a Microsoft employee used the first Virtual Private Network (VPN) to provide a secure connection to the Internet — which later was adapted into a popular method for remotely connecting with private corporate networks by the 2000s. Obviously, a lot has changed since then in terms of IT environments and infrastructure — that...
Read More
Truly popularized in the mid-2000s, multi-factor authentication (MFA) has been security practitioners’ go-to response whenever someone asks, “what can I be doing right now to protect my data and accounts?” It’s often listed as a default best practice to defend against many cyber attacks and attack vectors such as phishing, business email compromise (BEC), keystroke...
Read More
Today, many small and mid-sized businesses find themselves in similar situations when it comes to managing cybersecurity risks — they know there are prominent threats to their organization that they need to take seriously, but don’t have the means or knowledge to do so.  The first thought that comes to mind, especially with those firms...
Read More
Florida state agencies and local governments are now subject to new cybersecurity requirements and prohibitions that went into effect on July 1, 2022. These new amendments to Florida’s State Cybersecurity Act (“the Cybersecurity Act”) impose practically impossible-to-meet notification requirements on state and local governmental entities and prohibit them from making ransom payments. Stepping back to...
Read More
Best Practices for Managing Organizational Data Breach Privacy At conferences, networking events, trade shows, or even just at social gatherings, the topic may have come up that put you in a position where someone was telling you about a data breach or other cyber incident their business incurred. While the conversation may have been genuine...
Read More
As we continue our journey on what it means to practice holistic cybersecurity and its comprehensive methodology, we can now go into the process of getting your business to that point. Everything about going holistic and fully implementing a robust security strategy such as Zero Trust starts with “Identity.” Identification is merely the process of...
Read More
1 2 3 6