As noted before – the People — Process — technology image with an image of the books I have written, as well as Filotimo Here…
NIST Framework is a good base to create a security policy. I have discussed NIST Framework at my blogsite (oversitesentry.com) and there are 6 pieces…
Subscribe to continue reading Subscribe to get access to the rest of this post and other subscriber-only content. Type your email… Subscribe Already a subscriber?
I wanted to make a point of posting for my new video out on all 3 areas as mentioned in headline. Rumble Video link Youtube…
I wrote a blogpost at my oversitesentry website… here is one the images: I also created a Rumble video: Which is where I discuss if…
My blogpost on this topic at Oversitesentry shows the NIST-80063B publication to note that a long password is better for overall security rather than a…
So we are all happy to use LLM AI’s to help us run our lives more efficiently, but I was wondering how do we test…
Do you want to spend money before or after a hacker attacks you? Do you think you are not being attacked because you are too…
What if you could see some examples of real life attacks? What about a phishing email attack? Do you know the parts of an email…
Or what could be worse? What happens when the secret service show up at your door? First do not panic – ask for a badge.…
One aspect of risk is the people in the company. In a sample company one has management, sales, production of a product or service (workers),…
Is it sad that we have to not trust others anymore? But it is a necessity for surviving on the Internet these days. Since everything…
I found “Too late You’re Hacked” a very interesting read. This is good basic information that small business managers should pay attention to. Of particular…
Order Book Too Late, You’re Hacked! – Defending Your Small Business’ Computers and Networks is available from the publisher at Publishing Concepts bookstoreOpens in a…
To do that what I need to do is to hand you hundreds of pages of Information Technology understanding specific for your environment. I.e. when…
My latest blogpost at Oversitesentry discusses this image(below) among other things. After writing the blogpost I continued to research from my Security news analyzed page…