TTP – Tactics, Techniques, Procedures
How I help my customers use consistent methods to stay out of the news (i.e. reduce risks and not get hacked). We use TTP or Tactics, Techniques, and Procedures to help companies stay safe in… TTP – Tactics, Techniques, Procedures
What Could go wrong with a small company with 4 computers (or less)
How can the Overconfidence bias cause small business owners problems? The typical person does not think about cybersecurity in a regular day, as there needs to be attention paid to marketing, sales, and operations of… What Could go wrong with a small company with 4 computers (or less)
Let’s Improve Phishing Training for 2025
Over 20 years ago when I was a system administrator, was in charge of keeping up with about 70 computers or so. There was an interesting issue about malware/spyware reoccurring on one computer. After some… Let’s Improve Phishing Training for 2025
TonyZ Versus Hackers
As noted before – the People — Process — technology image with an image of the books I have written, as well as Filotimo Here is the basic situation – where your IT department (with… TonyZ Versus Hackers
Create a Security Policy using NIST framework
NIST Framework is a good base to create a security policy. I have discussed NIST Framework at my blogsite (oversitesentry.com) and there are 6 pieces to the framework: I have also discuss NIST framework on… Create a Security Policy using NIST framework
Latest video on Rumble, YouTube, and Spotify
Latest Rumble video on “Why Cybersecurity Audits” I wanted to make a point of posting for my new video out on all 3 areas as mentioned in headline. Rumble Video link Youtube Video link Spotify… Latest video on Rumble, YouTube, and Spotify
The Importance of Setting Up AI Ethics Testing Methodology
I wrote a blogpost at my oversitesentry website… here is one the images: I also created a Rumble video: Which is where I discuss if you want to wait until after AI denies your home… The Importance of Setting Up AI Ethics Testing Methodology
Password Policy: Complex or Long?
My blogpost on this topic at Oversitesentry shows the NIST-80063B publication to note that a long password is better for overall security rather than a complex password policy. The issue is that users tend to… Password Policy: Complex or Long?
How To Test LLM AI?
So we are all happy to use LLM AI’s to help us run our lives more efficiently, but I was wondering how do we test the software to make sure it is working correctly? I… How To Test LLM AI?
Why spend money on Cybersecurity and how much?
Do you want to spend money before or after a hacker attacks you? Do you think you are not being attacked because you are too small? What if you knew how easy it is to… Why spend money on Cybersecurity and how much?
Examples of Email scams
What if you could see some examples of real life attacks? What about a phishing email attack? Do you know the parts of an email that can be changed and can look like anything a… Examples of Email scams
Ok, You Have Been Hacked Now What?
Or what could be worse? What happens when the secret service show up at your door? First do not panic – ask for a badge. you are entitled to see their official badge! What does… Ok, You Have Been Hacked Now What?
What Should Small Business Do about Cyber-Attacks?
One aspect of risk is the people in the company. In a sample company one has management, sales, production of a product or service (workers), the workers might have some managers. The office workers of… What Should Small Business Do about Cyber-Attacks?
Think Low Trust to Solve Phishing
Is it sad that we have to not trust others anymore? But it is a necessity for surviving on the Internet these days. Since everything is being affected by China CCP these days we have… Think Low Trust to Solve Phishing
Review of Book “Too Late You’re Hacked”
I found “Too late You’re Hacked” a very interesting read. This is good basic information that small business managers should pay attention to. Of particular note was in the beginning of the book where you… Review of Book “Too Late You’re Hacked”
Video to Discuss How We can Turn The Tide of Cybersecurity Disasters
Order Book Too Late, You’re Hacked! – Defending Your Small Business’ Computers and Networks is available from the publisher at Publishing Concepts bookstoreOpens in a new window Ebook and Paperback versions:
Let’s Build Your Cybersecurity Brick by Brick
To do that what I need to do is to hand you hundreds of pages of Information Technology understanding specific for your environment. I.e. when you need to figure out how to do this thing… Let’s Build Your Cybersecurity Brick by Brick
We Must Improve our Cybersecurity!
My latest blogpost at Oversitesentry discusses this image(below) among other things. After writing the blogpost I continued to research from my Security news analyzed page and found this great post by Bruce Schneier: “On the… We Must Improve our Cybersecurity!