Recent Posts

Popular Posts

Physical Security to Combat Computer and Data Theft

Physical security controls are usually in the realm of “gates, guns, and guards.”  However, if you are working out from home or are a “road warrior” for your company, you will not be protected by armed security guards or a perimeter fence.  Within your house, there are several physical controls you should consider…

Configuration Management to Reduce Computer Vulnerabilities

Configuration management is a process of establishing and maintaining the integrity of your operating environment and applications.  Four main areas need configuration management: browser, OS, apps, and router…

Awareness and Training for Computer Security

Often, the user is the weakest link in securing systems. “Every system is secure until the user gets involved.” Why? Users are unaware of how their actions may impact the security of a system…

Keep Your Computer Safe With Access Controls

Do you log into your computer with the administrator account? If so, you could be putting your information at risk. Access control is the process of granting or denying specific requests to obtain and use information. Follow these 7 steps to safeguard your information…

Prevent Identity Theft on Vacation

Identity theft and information theft are scary, costly scenarios – and they are much worse if you are traveling or on vacation. If you are a cybersecurity professional traveling for vacation or for business, follow these special travel considerations…

Alternatives to Password Managers

The downside to the password manager approach is that applications in the cloud do get compromised, and your computer is only as secure as you allow it to be. Avoid using convenience as an excuse for cyber security. Keep your identity safe by considering password management alternatives…

Copy link