How to Create a Social Media Policy to Protect Your Business

How to Create a Social Media Policy to Protect Your Business

All the World’s a Stage …. For social media hacking As the bard said, “all the world’s a stage …” But under the bright lights of today’s social media platforms, men and women aren’t merely players—they have starring roles in a global town square. We can argue about...
Plan Your FY2020 IT and Security Budget Wisely

Plan Your FY2020 IT and Security Budget Wisely

Listen to Mom: Budget on a full stomach As your FY2020 IT and Security budgeting process looms, you would be well served to keep in mind one of those old adages your mom may have passed along—namely, don’t go grocery shopping on an empty stomach. This is especially...
What’s the Password for the House of Gryffindor?

What’s the Password for the House of Gryffindor?

This week we’re jumping around a little and diving into Step 5 of the Small Business Administration’s guidelines for defending your business against cyber threats—Use strong passwords and change them often to protect from external and insider threats.  Passwords are...
One Is NOT the Loneliest Number!

One Is NOT the Loneliest Number!

Reduce operational friction and resource drain by reducing your tools to achieve better security.  Nowhere does the maxim “complexity breeds errors” apply more than in the world of cybersecurity. From continuous updates being applied to firewall policies that lead to...