Thoughts From The Deck

NIST Cyber Security Framework Functions Explored

Last week we went through a brief overview of the primary functions of the cybersecurity framework. This week we'll dive a bit deeper into the identify and protect functions. The activities and the identify function are really foundational for effectively ...

NIST Cyber Security Framework Functions

Last week I introduced the National Institute of Standards and Technology Cybersecurity Framework, commonly referred to as the CSF and its primary functions. Identify, protect, detect, respond and recover. What are these five functions actually mean? Let's start with identify. ...

NIST Cyber Security Framework Introduction

As many of you know, unless I'm out of town, I sit here on the deck and share some cybersecurity tips, tricks and hints with you to provide some practical things that you can do to help keep yourself, your ...

Secure Access To Your Systems

Storing passwords and credit cards in your browser is a huge open door for hackers, so please don't do it ever. First issue is that anyone and it doesn't even have to be a cybercriminal who sleeps around your computer ...

Antivirus Isn't Enough

Many people out there think that if they have a trial version of an antivirus program on their computer that came with that computer several years ago when they bought it and has never, ever been updated, it will completely ...

January 2023 CMMC Town Hall Meeting

Today, I'm going to have a slightly different focus and talk about compliance instead of cybersecurity. Specifically, I'll discuss my thoughts from attending a virtual Cybersecurity maturity Model certification town hall meeting that was held just a few days ago. ...

Ways To Quickly And Safely Spot Phishing Email

Most of or maybe all of us have clicked on a phishing email at some point in our lives. Most of them were easy to spot only a few years ago. But even then, if you were in a hurry ...

The #1 Thing You Can Do To Prevent Ransomware

Here on the strategic playing deck again, chairs. Did you know that the number one security threat to all organizations, large and small, is internal employees clicking on compromised e-mails? E-mail continues to be the number one source for delivering ...

What is Zero Thrust?

I think we've talked about this before, but I still get some pushback from prospects that think it's not important as a part of your network security. So let's talk about it again since it's been a while. Zero Trust ...

Password Vault LastPass Incident

Hopefully, most of you have heard the news about LastPass, a leading password management software. They recently confirmed that a reported breach was far worse than the security community initially believed. I'm talking with you about it today because the ...

Contact

TechSage SolutionsTechSage Solutions Logo $$$