by Tony Asher | Feb 13, 2023 | Blogs
In this article I’m going to walk through my approach using Microsoft Security Center and what steps you can take to immediately reduce risks associated with having Azure cloud. Microsoft defines Cloud Security Posture Management (CSPM): identifies and remediates...
by Tony Asher | Aug 26, 2022 | Blogs
Your ‘risks’ are only as accurate as the ‘threats’ you’ve identified. You need a threat modeling practice. Introduction A great cybersecurity program starts with the foundational ability of determining cyber risk. Although there is a not a certified, industry standard...
by Tony Asher | Oct 1, 2020 | Blogs
Have you ever been in this situation? You’re looking forward to that new partnership, or bringing on that new client, and then you receive a cybersecurity questionnaire. The shock initially confuses you because you thought you were further along in the process than...
by Tony Asher | Aug 17, 2020 | Blogs
Before we discuss how to encrypt an external hard drive, it helps to know what it is. A hard disk drive is also known as a hard disk, hard drive, or fixed disk. It is an electromechanical data storage device. It uses one or more rigid fast rotating platters, which are...
by Tony Asher | Aug 17, 2020 | Blogs
What are the Types of Cyber Security? What would your life look like without your electronics? Could you cope? Probably not. Our mobile devices, computers, and other devices are nearly inseparable from us. Individuals and businesses alike rely on electronics to...
by Tony Asher | Jul 22, 2020 | Blogs
Passwords keep our valuable data secure—but in the wrong hands, they can spell disaster! In a world where nearly everything happens online, passwords are the last line of defense. Think banks accounts, social media accounts, sensitive company data, or delicate...
Recent Comments