BLOG

How to Use Metrics in Cybersecurity

"What gets measured gets managed," the famous words from Peter Drucker. I've tried many ways of putting metrics around security initiatives. Some have been successful, some have been a failure, the worst have added confusion. Reporting cybersecurity metrics does have...

What is Prescriptive Security – Cybersecurity

I've wasted so much money at the doctor's office. It's deeply influenced the way I look at 'going to the doctor'. I'll be that guy that should've gone in a lot earlier, but now I"m stuck with some horrible prognosis because I delayed. I once went in to have my knee...

What is Log Management – Minnesota Cybersecurity

  In the wonderful world of cybersecurity, one of the favorite tools to use to detect malicious attempts to breach and compromised data is a tool we call SIEM. SIEM: Security Information and Event Management Not only can it help us detect events when it's configured...

Minnesota Cybersecurity Endpoint Strategy

We have a tendency in cybersecurity to make everything a big deal. As a cybersecurity advisor, I try not to be that person that is yelling, "the sky is falling and the world is coming to an end". But, if I had to pick only three 'big deals' it would be user security...

How to Setup a Company Firewall

What's the best way to set up a company firewall for your business? That’s the right question to ask once you’ve made a decision to protect the perimeter, servers, or endpoints on your network with a firewall. This is an often overlooked question because people assume...

Minnesota Ransomware Security Consultants

Do you have a computer that has been hijacked by a malicious hacker asking for money to unlock it? Are they threatening you by adding a timer, only giving you so long to respond? Even worse, has this ransomware spread to other computers on your network and even...

What is a Cybersecurity Maturity Model?

What is a Cybersecurity Maturity Model? It is a framework of security controls combined with a standardized way of measuring the maturity of each area or pillar. It is repeatable and conformed to a process. Because the process is repeatable, the system can be used for...

Minnesota Cybersecurity Consultants

Are you looking for a cyber security consultant in Minneapolis / St. Paul Minnesota area to help you with your information security program? Look no further, you’ve found the right place.     Finding the right consultant is difficult. Industry demands combined with...

Weighing Compliance on your Cybersecurity Program

How do you weigh compliance in your information security program? Does it take the most important place, the front seat to all other initiatives? Or is it an afterthought that is no longer practical in today's cybersecurity landscape? So many companies that were...