Enhancing Cybersecurity with Conditional Access Policies
As organizations embrace cloud services and remote work to fuel business growth, they must reassess conventional security measures to safeguard sensitive data, applications and resources....
Read Article
Incident Response Planning: Defend Against Cyberattacks
How Incident Response Planning Helps Contain Cyberattacks Despite businesses pouring resources into cybersecurity, breaches aren’t going away — or even slowing down. In 2022 alone, companies...
Read Article
Simulated Phishing Campaigns Can Improve Employees Awareness
Anyone who watched TV in the 90s will undoubtedly remember the NBC PSAs with the catchy jingle, “The more you know…”. It was sage advice then, and in today’s modern technological world, where...
Read Article
To MFA or Not to MFA – It’s Not Really a Question Anymore
If you’ve ever used Microsoft 365, you’ve likely encountered multi-factor authentication (MFA). And if you’re like most, you probably find it a bit of a hassle. But the truth is that MFA is...
Read Article
The Difference Between Cybersecurity and Cloud Security?
What is the difference between cybersecurity and cloud security? Which of these security aspects is appropriate for your organization? On their face, these two terms appear to cover similar...
Read Article
How to Get Board-Level Buy-In for Cybersecurity Awareness
It’s October, which everyone knows means time for trick-or-treating, pumpkin-spiced everything and cybersecurity awareness. Ok, possibly you didn’t immediately think of that last part. However,...
Read Article
Zero Trust is effective – what else is needed for security?
In my last blog on Zero Trust (on June 6 of this year), I talked about the reasons why Zero Trust is becoming more popular and why the change is necessary. In this blog, I want to delve more into...
Read Article
Understanding Zero Trust
The Zero Trust Network, or Zero Trust Architecture, model was created in 2010 by John Kindervag, who at the time was a principal analyst at Forrester. He defined it as a security concept...
Read Article