Category: Cybersecurity

Data Loss Prevention for Any SMB

Data Loss Prevention for Any SMB

It's time for a new guide for MSPs! The Safeguards within CIS Control 3 speak to the need for proper Data Protection. Implementation Group 1 (i.e.: the minimum we should do) covers some basic data management and protection practices such as: Establishing and...

read more
CISA’s Secure by Design Pledge

CISA’s Secure by Design Pledge

In some very exciting news today, CISA announced their Secure by Design Pledge. The Secure by Design Pledge is a voluntary commitment that was signed by 68 software companies, committing to design their products from the ground up in a more secure way. I've linked the...

read more
Are Passkeys the Answer to Passwordless Adoption?

Are Passkeys the Answer to Passwordless Adoption?

In our digital age, the concept of living in a passwordless world is eagerly anticipated. It's common knowledge that passwords are a hassle – users struggle to create and remember strong passwords, and the tools meant to help, like password managers, haven't gained...

read more
Tips for a Successful MFA Rollout

Tips for a Successful MFA Rollout

IMPORTANT NOTE: I'm trying something new here and looking for feedback (on LinkedIn). I've written this post using Microsoft Copilot by creating a general outline of "points to hit" in addition to a key topic. I'm experimenting with this to see if it can expand my...

read more
Data Classification for All

Data Classification for All

I figured I would expand on my Purview Information Protection information by creating a general guide around information protection labels. In this guide, I take a deeper dive into Purview Information Protection and provide you with some implementation examples that...

read more
Cybersecurity Doesn’t Need Colleges

Cybersecurity Doesn’t Need Colleges

It's no secret that we're facing a huge shortage of cybersecurity talent, today and in the future. We are in increasingly desperate need of new blood to fight this increasingly complicated battle. The problem is, there is an intense amount of gatekeeping today that a...

read more