Category

Next Generation Security
“Seeing Yourself in Cyber”  Since the 2004 declaration by the President of the United States and Congress, we dedicate each October as Cybersecurity Awareness Month. The annual campaign is sponsored through a conjoined effort between the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) — providing support from both the federal...
Read More
On September 22nd, 2022, the Crowdstrike Fal.Con cybersecurity conference concluded — providing numerous seminars and industry updates to security practitioners on solutions to enhance organizational security postures, identify risks, and fully understand some of today’s lingering threats.   Our CEO and founder Delta Munoz attended this conference and came back with tremendous insights to incorporate into...
Read More
In 1996, a Microsoft employee used the first Virtual Private Network (VPN) to provide a secure connection to the Internet — which later was adapted into a popular method for remotely connecting with private corporate networks by the 2000s. Obviously, a lot has changed since then in terms of IT environments and infrastructure — that...
Read More
Truly popularized in the mid-2000s, multi-factor authentication (MFA) has been security practitioners’ go-to response whenever someone asks, “what can I be doing right now to protect my data and accounts?” It’s often listed as a default best practice to defend against many cyber attacks and attack vectors such as phishing, business email compromise (BEC), keystroke...
Read More
Florida state agencies and local governments are now subject to new cybersecurity requirements and prohibitions that went into effect on July 1, 2022. These new amendments to Florida’s State Cybersecurity Act (“the Cybersecurity Act”) impose practically impossible-to-meet notification requirements on state and local governmental entities and prohibit them from making ransom payments. Stepping back to...
Read More
11 best practices for managing organizational proactive cybersecurity threats during these high-intensity times As global conflicts have been unfolding overseas, organizations in the United States need to be on high alert for the cybersecurity threats that have been recently surging. It’s important to take a proactive approach by preparing as if your network systems, devices,...
Read More
Although it may seem counterintuitive, many organizations will find themselves in awkward positions where they invested time and money into a new software platform, Cloud Security solution, or automation tool only to not fully adopt it (or even use it at all). For instance, something as time-saving to employees as customer relationship management (CRM) software...
Read More
Cyber insurance has increasingly become one of the most valuable insurance coverages sought out by organizations of all shapes and sizes. As cyber-related threats continue to evolve and multiply, the insurance offers a financial umbrella for those who fall victim to attempted and successful breaches.  Cyber insurance consists of two major components; first-party and third-party...
Read More
Endpoint detection & response (EDR) is a cybersecurity solution consisting of multiple tools (including AI) that monitor for potential security threats and address them head on. This technology works by constantly collecting information from endpoint devices connected to an organization’s network such as desktops, servers, laptops, or tablets. By “information,” we are mostly referring to...
Read More
Keep this in mind as we start the 2022 Windows software patching year: Patching is not enough to keep Microsoft 365 protected. Before you purchase third-party tools that claim to protect you from all threats, or before you begin that zero-trust project, stop for a moment to evaluate whether you are doing all you can...
Read More
1 2