Secure Cloud Computing: 7 Ways I’d Hack You On AWS

If you’re like most businesses, you’re thinking about moving to the cloud but you’re worried about secure cloud computing. Lower costs, more control, and greater resiliency are all powerful motivators. But the loss of control of your environment is awfully scary. A move to the cloud presents new security challenges. There are new tools to learn and […]
Information Security Policy: 13 Fantastic Resources

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or […]
Clean Desk Policy: Benefits, How-To, Examples

A Clean Desk Policy doesn’t mean you need to wipe down your desk every day. Although, please do this anyway! A Clean Desk Policy means so much more than that. It means protecting important data like sensitive data and passwords. Yes – passwords – a Clean Desk Policy absolutely means you need to stop writing […]
HIPAA Compliant Gmail: The Perfect How-To Guide

Does HIPAA-compliant Gmail exist? The answer is YES if you set it up properly. Read on more to learn how! Google’s email, calendar, and productivity tools (recently renamed from G Suite to “Google Workspace”) are absolutely fantastic. They’re easy to use and very affordable. Google Workspace is also highly secure, but there are very specific […]
Possible Technology Vendors for CMMC / NIST 800-171

One of the most common questions that we get is about NIST 800-171 or CMMC technology vendors. Which technologies are “approved” for CMMC? The answer, of course, is none of them. Since widespread audits haven’t started, there’s no way to tell exactly which vendors will pass muster. In the course of work doing CMMC consulting and coaching, […]
The Friendliest Way to Lose Millions of Dollars

They may be trying to steal 10 million dollars from you, but that doesn’t mean they have to be rude. Last year, a company was hit with ransomware. Nothing unusual there. But what makes this fascinating, and helps us to understand just how sophisticated these companies are, is the fantastic level of customer support the […]
8 Simple Steps to Maximize your Wi-Fi Security

When was the last time you checked your Wi-Fi security settings? If your answer is “not since the day I bought my router“, you should probably keep reading. The COVID-19 pandemic changed the way we work. Employees and managers around the world have realized that we don’t necessarily need to be tied to a physical […]
Prevent a WordPress Hack in 5 Easy Steps

WordPress is the most popular content management system out there today. Of the 1.3 billion websites in existence across the internet, over 455 million of them are using WordPress. A user base that large attracts cybercriminals. Hackers who are aiming to use your website to distribute malware, gain user data, send spam emails, and redirect […]
Office 365 HIPAA-Compliance – 6 best features and how it works?

Office 365 HIPAA Compliance is crucial for the healthcare industry as more and more entities are looking to secure their patient’s sensitive information. The good news is corporate giants like Microsoft are making great investments and innovations in both robust security settings and HIPAA compliance for many of their most popular products. Office 365 has […]