Ahh texting. Arguably the start of the digital communications revolution. The good ‘ol short message service (SMS). To this day, texting is a key method of communication. However, there’s one key thing that texting is not: secure.
Category: Cybersecurity
Modern Security Baby Steps: Mobile Application Management
Implementing MAM is one simple step that you can take for a quick security gain! It will help ensure that data on untrusted devices is at least controlled and protected.
MFA is a Compulsory Item
I might generate a bit of a stir, but this must be said! You cannot be defensible if you are not meaningfully implementing multi-factor authentication. If I'm being honest, having this conversation is getting so old. We've been having it for years yet, somehow,...
Microsoft’s Cyber Signals: Identity is the New Battleground
Microsoft is one of the most powerful, intelligent cybersecurity firms on the planet. Many people don't realize just how much intelligence Microsoft has at their disposal. In their new intelligence brief series, Cyber Signals, Microsoft is pulling back the curtain and...
Where do I put my data? The Layers of Microsoft Cloud
Knowing where to store your data, specifically gov data, based on its type can be tricky. Microsoft has helped peel back the veil.
Review: FEITIAN Security Keys
FEITIAN recently reached out to me on LinkedIn and asked if I’d be willing to take a look at their security keys. As you may know, I’m a major proponent of FIDO/U2F, and I’ve been a Yubikey user since it was just YOTP. That said, I was curious to check out FEITIAN’s...
No Framework Can Mean No Defensibility
Frameworks are extremely important in the modern security landscape. With the level of complexity of today’s average environment, even in the SMB arena, shooting from the hip is hardly an option anymore. In fact, I’d almost challenge that the way the SMB sector has approached security for well over a decade has just been plain wrong, let’s dive in.
Business Email Compromise is Still Alive and Well!
Ransomware, zero-days, and other "sexier" attacks have dominated the news lately. But an article I read on The Record served as an important reminder that business email compromise (BEC) attacks are still very much alive and well. BEC's are one of the simplest attacks...