Network Segregation and Segmentation

Often, organizations that wish to mitigate the security risk of their networks, choose to divide them in separate network segments or domains.  When architecting and establishing these domains, the design is typically based on the sensitivity of information, organization of the company, and the associated and necessary trust levels of Read more…

Cybersecurity Maturity

The objective of any cybersecurity framework is to provide a methodology and common set of recommended or prescribed controls for the user to implement to protect information.  Once the framework is implemented, what separates the beginners from the pros?  The organizations that have been on the playing field longer are Read more…

Company Owned and BYOD Devices

How are employees connecting? In times where everyone who does their job from a computer is working from home, companies are being creative about making the environment available to the workers.  Is the risk of a work at home environment being completely considered?  We will examine the different scenarios:   Read more…

DLP – Data Loss Prevention

What is “DLP” or “Data Loss Prevention” One of the most important and valuable assets a company possesses is the information.  This has become clear over the years based on the attacks by malicious parties and actors to steal that information, render it unusable, and make it unavailable.  Client/patient information, Read more…

Cybersecurity Awareness Month – Next Steps

Were you aware that October was Cybersecurity Awareness Month, or previously known as National Cybersecurity Awareness Month? Did you also know that in 2021, Cybersecurity Awareness Month celebrated its 18th anniversary?   In 2004, the National Cybersecurity Alliance and the Department of Homeland Security CISA (Cybersecurity and Infrastructure Security Agency) Read more…