“MaaS” – Malware as a Service

We’re familiar with the “as a service” offerings that are commonly used to support or augment our IT applications, platforms, and infrastructure: “Saas” – Software as a Service – Typically, these are best known as cloud applications. These days, we use these more than we use software installed on our Read more…

Passwordless Authentication

We know the routine.  Open an application or go to a web site, enter in your user ID, and authenticate with a password.  Lately, however, you have noticed a third step.  Once you enter your password, you receive another instruction to enter a code sent to your mobile device or Read more…

Network Segregation and Segmentation

Often, organizations that wish to mitigate the security risk of their networks, choose to divide them in separate network segments or domains.  When architecting and establishing these domains, the design is typically based on the sensitivity of information, organization of the company, and the associated and necessary trust levels of Read more…

Cybersecurity Maturity

The objective of any cybersecurity framework is to provide a methodology and common set of recommended or prescribed controls for the user to implement to protect information.  Once the framework is implemented, what separates the beginners from the pros?  The organizations that have been on the playing field longer are Read more…

Company Owned and BYOD Devices

How are employees connecting? In times where everyone who does their job from a computer is working from home, companies are being creative about making the environment available to the workers.  Is the risk of a work at home environment being completely considered?  We will examine the different scenarios:   Read more…