Prepare for Ransomware
Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack. This guide was a joint effort of...
Cybersecurity for Local Governments 2018
2018 update on cybersecurity for local governments. This year marks the rise of the new threat to Local Government from nation states...
Cybersecurity Policy for Local Governments
Here is a sample high-level cybersecurity policy for a city, district, or county. It is designed to be a high-level statement adopted by...
Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...
Default Security Settings, What Needs to Change?
Today, news agencies and outlets are reporting Information Technology (IT) breaches and loss of protected data at alarming rates. The...
Hacking a Tesla
This is another demonstration of how people can hack into cars. However, just because it is possible does not mean it is practical. Look...
CIS Controls Version 7 Launch Event
CIS Controls Version 7 Launch Event | March 19th 2018 Shady DOM styles for custom-style Shady DOM styles for dom-template Shady DOM...