Blog
CyberSecurity Compliance… Where to Begin?
I recommend clients start with the NIST Cybersecurity Framework. There are various components, but today we will specifically focus on 800-53 which is a cybersecurity
Amazon Alexa features you should disable for Privacy Purposes
Amazon Sidewalk – The idea behind Amazon Sidewalk is to take a slice of your broadband as well as from others on your street to
Ransomware Attack -5 Steps to reduce your susceptibility
Protecting against ransomware needs to be embedded within every part of the organization. It is important clearly defined security policies are in place, trained upon
Cybersecurity Made Simple – 5 Steps to Securing Your Work From Home Network
Define approved hardware, software and cloud-based products allowed to be utilized by employees. Security and system usage policies should be defined, documented, distributed and trained
Vendor Management – Key points when reviewing vendor security
Before clicking I Accept, I Agree or signing a contract, it’s imperative to understand the risk being assumed. The first consideration is, “What?” What information
Cybersecurity Made Simple – 5 First Steps to becoming Compliant
Cybersecurity, a word that has become so daunting most feel it’s a subject they could never understand, let alone a process they could implement in