What is True Cybersecurity Risk?
Let us discuss this as simple as possible… When you walk into your business in the morning what is the risk for you to be hacked? There may be a small percentage if all of… What is True Cybersecurity Risk?
Let us discuss this as simple as possible… When you walk into your business in the morning what is the risk for you to be hacked? There may be a small percentage if all of… What is True Cybersecurity Risk?
What do you think the original problem of Government fraud would be? Is it government incompetence? Willful corruption? How about the simplest answer(in my mind) … according to CBSNews 60 minutes video and article. “The… Origins of Government Fraud
How I help my customers use consistent methods to stay out of the news (i.e. reduce risks and not get hacked). We use TTP or Tactics, Techniques, and Procedures to help companies stay safe in… TTP – Tactics, Techniques, Procedures
How can the Overconfidence bias cause small business owners problems? The typical person does not think about cybersecurity in a regular day, as there needs to be attention paid to marketing, sales, and operations of… What Could go wrong with a small company with 4 computers (or less)
Over 20 years ago when I was a system administrator, was in charge of keeping up with about 70 computers or so. There was an interesting issue about malware/spyware reoccurring on one computer. After some… Let’s Improve Phishing Training for 2025
As noted before – the People — Process — technology image with an image of the books I have written, as well as Filotimo Here is the basic situation – where your IT department (with… TonyZ Versus Hackers
NIST Framework is a good base to create a security policy. I have discussed NIST Framework at my blogsite (oversitesentry.com) and there are 6 pieces to the framework: I have also discuss NIST framework on… Create a Security Policy using NIST framework
Latest Rumble video on “Why Cybersecurity Audits” I wanted to make a point of posting for my new video out on all 3 areas as mentioned in headline. Rumble Video link Youtube Video link Spotify… Latest video on Rumble, YouTube, and Spotify
I wrote a blogpost at my oversitesentry website… here is one the images: I also created a Rumble video: Which is where I discuss if you want to wait until after AI denies your home… The Importance of Setting Up AI Ethics Testing Methodology
My blogpost on this topic at Oversitesentry shows the NIST-80063B publication to note that a long password is better for overall security rather than a complex password policy. The issue is that users tend to… Password Policy: Complex or Long?
So we are all happy to use LLM AI’s to help us run our lives more efficiently, but I was wondering how do we test the software to make sure it is working correctly? I… How To Test LLM AI?
Do you want to spend money before or after a hacker attacks you? Do you think you are not being attacked because you are too small? What if you knew how easy it is to… Why spend money on Cybersecurity and how much?
What if you could see some examples of real life attacks? What about a phishing email attack? Do you know the parts of an email that can be changed and can look like anything a… Examples of Email scams
Or what could be worse? What happens when the secret service show up at your door? First do not panic – ask for a badge. you are entitled to see their official badge! What does… Ok, You Have Been Hacked Now What?
One aspect of risk is the people in the company. In a sample company one has management, sales, production of a product or service (workers), the workers might have some managers. The office workers of… What Should Small Business Do about Cyber-Attacks?
Is it sad that we have to not trust others anymore? But it is a necessity for surviving on the Internet these days. Since everything is being affected by China CCP these days we have… Think Low Trust to Solve Phishing
I found “Too late You’re Hacked” a very interesting read. This is good basic information that small business managers should pay attention to. Of particular note was in the beginning of the book where you… Review of Book “Too Late You’re Hacked”
Order Book Too Late, You’re Hacked! – Defending Your Small Business’ Computers and Networks is available from the publisher at Publishing Concepts bookstoreOpens in a new window Ebook and Paperback versions:
To do that what I need to do is to hand you hundreds of pages of Information Technology understanding specific for your environment. I.e. when you need to figure out how to do this thing… Let’s Build Your Cybersecurity Brick by Brick
My latest blogpost at Oversitesentry discusses this image(below) among other things. After writing the blogpost I continued to research from my Security news analyzed page and found this great post by Bruce Schneier: “On the… We Must Improve our Cybersecurity!