top of page
Search


Uncovering the Silent Epidemic: Healthcare Ransomware and its Devastating Impact
My doctors office experienced a ransomware attack last year. All my doctors appointments were cancelled for over a month. The doctors...
Feb 34 min read
4 views
0 comments


Hashing
When we talk about hashing we are not talking about making a form of potatoes. Hashing is a mathematical algorithm that changes the input...
Jun 25, 20242 min read
5 views
0 comments


Encryption
I will never forget the time at a business show someone approached the AP-Cyber booth. They admitted they were out of compliance with...
Jun 17, 20242 min read
7 views
0 comments


Monitoring- Vital for Cyber's Future
We hear about breaches in the news constantly. We all hope we aren't the next ones to be affected. However, the truth is we will likely...
May 30, 20242 min read
5 views
0 comments


Compliance vs. Actual Security
Regulations serve a great purpose. They make sure folks are meeting a minimum standard. People want to know that if they disclose...
Mar 14, 20242 min read
13 views
0 comments


Penetration Tests Vs. Risk Assessments
The number one thing that everyone asks for when they come to us is a penetration test. They hand us external facing IP addresses and...
Mar 5, 20242 min read
18 views
0 comments

Change Management
There are multiple security controls listed in cyber best practices related to change management. Yet, when I talk to people many times...
Mar 1, 20242 min read
16 views
0 comments


Software Security
We all use software programs to accomplish various tasks. We've discussed in a past blog about conducting cyber evaluations before...
Jan 11, 20241 min read
15 views
0 comments


Open Source Intelligence (OSINT)
There is tons and tons of information about us that we give away freely everyday. There is social media where we are openly sharing...
Dec 27, 20232 min read
68 views
0 comments


Supply Chain- You are Only as Strong as Your Weakest Link
There are many applications that do all kinds of amazing things available. Users always want the latest and greatest. Many organizations...
Dec 4, 20232 min read
11 views
0 comments


The Onion Model- Defense in Depth
Way back when cyber used to be all about your perimeter. Organizations would put in a firewall and other tools in an effort to keep the...
Nov 20, 20232 min read
5 views
0 comments


Technical Controls Versus Process
I have met people that do not have many technical skills and are afraid that means that they can not adequately protect their...
Nov 13, 20231 min read
8 views
0 comments


Data At Rest Encryption
I was at a public event years ago covering a cybersecurity booth. Someone approached and said she had to meet encryption requirements for...
Oct 30, 20232 min read
8 views
0 comments


Vulnerability Ratings
When you conduct a vulnerability scan of your systems, things will come with ratings. You will also see ratings when a software vendor...
Oct 23, 20232 min read
5 views
0 comments


Cloud Shared Responsibility Model
The cloud has all the answers doesn't it? One might think that way from all the advertising out there. However, not all cloud services...
Oct 16, 20231 min read
8 views
0 comments


Incident Response Plan
One of the big things that surprised me when I first started trying to help local small businesses was the lack of a plan or knowledge...
Sep 11, 20231 min read
3 views
0 comments


Least Privilege
Least privilege isn't sexy. It isn't a highly technical toy that promises to do all kinds of nifty things to ward off evil attackers....
Sep 4, 20232 min read
23 views
0 comments


Physical Security
There are many cyber things that play a role in your security. But an obvious and often overlooked security item is physical security...
Aug 29, 20231 min read
8 views
0 comments


Artificial Intelligence (AI), Machine Learning (ML) and Cyber
We keep hearing about all these AI discoveries recently. But is it AI or is it ML? What's the difference? AI is when a machine thinks for...
Aug 29, 20232 min read
6 views
0 comments


Data Typing
We talked in a previous blog about how it was important to know what you have. The previous blog focused on an inventory of your software...
Aug 25, 20232 min read
9 views
0 comments
bottom of page