Majority of us continue to make bad choices with credential hygiene. The formula for protecting credentials is fairly simple: unique passwords stored securely and multi-factor authentication. Implementing that formula requires little more than the willingness [...]
Class action lawsuits come with months, if not years, of effort to collect attorney's fees out of settlements. Increasingly lawyers find themselves in need of processing thousands of email messages to account for their time. [...]
Recently a New York City law firm approached us with a problem: the other party was dumping thousands of pages of discovery into their Everlaw eDiscovery services and generating thousands of dollars of monthly expenses. [...]
The Apple macOS security and privacy features make remote management tough. Apple's macOS Sierra introduced new security features that simplify apps from the App Store, but complicate everything else. This spells trouble for applications that [...]
Once in a blue moon we have a business owner dismiss security risk based on claiming they are simply not interesting enough, or not valuable enough, to be targeted by malicious actors. They see themselves [...]
The shared responsibility model has been the center of our end-user solutions, despite the idea being a tough sell. Even today, it is relatively common for organizational staff to expect "help-desk" or "tech support" for [...]
Cybersecurity means protecting electronic devices and electronically stored information. Cybersecurity is a component of information security and addresses protection and restoration of information technology within an organization. All organizations are different and thus require different levels or protections. Likelihood is the chance that a threat will affect a business and serves as a guide in determining what protections should be put into place.
Strategic thinking is at the heart of information security and each organization needs to meet demands of adequate security. Any company, big or small, should be capable of doing an inventory of all information technology assets and analyzing risks. For small organizations this can be as simple as understanding each asset’s confidentiality, integrity, and availability needs; rating it’s importance to the business and acceptable recovery points and time windows; and allocating resources for methodical solutions to the most important parts.