BLOG

What Are the Types of Cybersecurity?

What are the Types of Cyber Security? What would your life look like without your electronics? Could you cope? Probably not. Our mobile devices, computers, and other devices are nearly inseparable from us. Individuals and businesses alike rely on electronics to...

Best Way to Keep Passwords Organized

Best Way to Keep Passwords Organized

Passwords keep our valuable data secure—but in the wrong hands, they can spell disaster! In a world where nearly everything happens online, passwords are the last line of defense. Think banks accounts, social media accounts, sensitive company data, or delicate...

Asset Management Policy (free downloadable policies)

Asset Management Policy (free downloadable policies)

To skip the article and download the policies and procedures provided: Asset Inventory - Policy and Procedures Sample-Asset Management Policy Introduction In our last several articles we’ve discussed and dived deep into the topic of asset management. Asset management,...

How to Improve Asset Management for Cybersecurity

Asset management is a pain. It’s like the gatekeeper to all the great cybersecurity controls. It’s like the cold vegetables on your plate you know you should eat before diving into that hot juicy piece of Midwest steak… And most of the time, as security professionals,...

SMB Cybersecurity Threats are Real

The cybersecurity threat to SMBs is real. Matter of fact, beside this pandemic, I believe cyber-attacks are the largest threat that SMBs face. Misplaced Hope From my experience consulting in the Minnesota SMB space I observed business leaders make the incorrect...