Your Password Policy Makes You Vulnerable: How to Fix It
The life of a small- or mid-sized business’s IT manager certainly would never be described as “easy.” These are the people you’ve charged with keeping the company's computer systems running and secure. It's a tough job. So please forgive them for how they’ve decided,...
How to Destroy Perfectly Good Cybersecurity Policies
One of my favorite phrases is "snatching defeat from the jaws of victory." The slight modification of the old idiom is the perfect way to understand how it's possible for even the most effective, well-written, well-intentioned, and strategically developed...