What is Zero Trust Cybersecurity and How Much Does it Cost? [Podcast]
Zero Trust is one of the most popular phrases thrown about by cybersecurity professionals and - more importantly - thrown into cybersecurity sales pitches these days. It's obviously important, and it's obviously something you want. But what is it? Is it really...
Why Cyber Resilience is the Best Metric for Cybersecurity [Podcast]
There are a lot of ways to measure the impact - and relative success - of a cybersecurity program. There are tests you can run to determine how effectively your employees are adopting defenses to phishing emails. There are table-top exercises to determine your ability...
What is a DDoS Cyberattack? [Podcast]
The best way to make sure that you and your business are protected from cyberattacks is to employ a broad-focus cybersecurity strategy. In order to do so, you need to have a basic understanding of the threats your business faces from cybercriminals, hacktivists, and...
How Implementing Least Privilege will Protect Your Business [Podcast]
The more access users have to your company's data, the more vulnerable that data is in the event of a data breach. A malicious actor gaining access to one of your employee's credentials gives them access to everything that employee is allowed to see. That's why you...
Disaster Recovery: Forming Your Disaster Response Team
If it seems like each step in preparing your Disaster Recovery Plan is the most important step, even more important than the one that came before it, I can’t blame you. That said, we’ve come to another really important step – creating your Disaster Response Team (the...
8 Lessons from the Uber Hack [Podcast]
So, right from the start, let's clarify - this is about the Uber hack that occurred (or was discovered/publicized) in September of 2022. In fact, it was a rather unique breach of an oft-breached company. The hacker who breached Uber appears to have used very basic...
Disaster Recovery: Performing a Disaster Risk Assessment
The first step in creating an effective plan to protect your business from potential disaster is to establish an understanding of your actual risks. Given the many types of disasters that could cause your business to cease operations, and the different ways you will...
Automated Vulnerability Scanning – Do You Know Your Weaknesses? [Podcast]
One of the big shifts in cybercrime, and the cyber criminals behind it, over the past 20 years has been from manual to automated processes. Where cyberattacks used to require hands on a keyboard and took a considerable amount of time to execute and complete, today's...
Disaster Recovery: Your Disaster Recovery Action Items
Here it is, probably the part you expected to occupy the majority of your time setting up your Disaster Response Plan: the things your team actually needs to do. These are your Disaster Recovery Action Items. These items will largely be specific to the type of...
Disaster Recovery Plan – Is Your Business Prepared? [Podcast]
Disasters happen. They can occur without notice, or they can have been predicted for months. They can last for seconds, like an earthquake, or they can linger for years, like a pandemic. They have the capacity to bring your entire business to a halt. When a disaster...