ScamSpotter.org, powered by Cybercrime Support Network and Google, has had 318K unique views in its first year. The Scam Spotter partnership came from a shared desire to provide seniors with…Learn MoreScamSpotter.org – Security tips for Internet users
In light of the recent Kaseya supply-chain attack, the relationship between IT/manged services providers and small to mid-sized businesses has come to the forefront. Responsibility and expectations are the the…Learn MoreCybersecurity for SMBs and MSPs
I’ve seen quite a bit of Google Chrome Remote Desktop in the wild as of late, and to me it presents some challenges worth talking about and being aware of.…Learn MoreShadow IT: Google Chrome Remote Desktop
“An ounce of prevention is worth a pound of cure.” Here are some useful bits of info that might help justify cybersecurity program improvements: According to the Sophos State of…Learn MoreHow to justify spending on cybersecurity
For quite some time this has been difficult to find. NIST SP 800-171 and the CMMC require the use of FIPS validated cryptography when protecting the confidentiality of CUI. Using…Learn MoreMeraki FIPS Compliance
For those looking for information on CUI training or additional CUI resources, here are a few helpful links: DoD Mandatory Controlled Unclassified Information (CUI) Training https://securityhub.usalearning.gov/index.html DoD CUI Program https://www.dodcui.mil/…Learn MoreCUI Resources
Background You might see it referred to as 2FA, MFA, or 2-step, but it all refers to having an additional authentication mechanism when we log in to a particular system.…Learn MoreMulti-factor authentication
IT professionals and power users employ all sorts of utilities for daily tasks. Often, a quick search will suggest several options that might work for what is trying to be…Learn MoreIs this file safe?
A great example popped up today regarding truly effective vulnerability management. Many businesses have automated patching tools, and some may be under the impression that by having a solution like…Learn MoreVulnerability management: is patching enough?
Having recently attended the ISOO’s CUI Fundamentals of Marking course, I would recommend data owners, compliance officers, and others follow the CUI Program Blog and look for future Marking courses.…Learn MoreMarking CUI