Facebook and Categories

I Started a new 6 week intensive today, so the blog entry is a bit late in the day. I chose to prioritize quality time with people, then day 1 studies and now, here I am. I was thinking a lot today about my writing and facebook. I have always been one of the standout…

The Afterthought

All things security in 2019 – still an afterthought. Why is that? The leading risks to business are still directly tied to security controls and yet, most businesses, including startups are still trying to tack on security at the end if at all. Wikipedia says Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused…

Secret to Security

Slow down, focus as if you had one person to serve. Do not be made a fool by that Nigerian Prince. Do not act on emotion out of urgency Respond instead of react Narrow your scope and set clear boundaries

Start !t Up – Security, That Is

Security is not something thought of at most startups, sadly – it is an afterthought, the old school way of thinking it can be tacked on later is overly prevalent. Studies have been done – the more up front you are in getting the security conversation going, becoming proactive – the longer you will survive…

4 Steps to Spot Spam

1. The email has improper spelling or grammar This is one of the most common signs that an email isn’t legitimate. Sometimes, the mistake is easy to spot, such as ‘Dear eBay Costumer’ instead of ‘Dear eBay Customer.’ Others might be more difficult to spot, so make sure to look at the email in closer…

Home Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to protect yourself, like keeping your computer software up-to-date and giving out your personal information only when you have a good reason. Use Security Software That Updates Automatically The bad guys constantly…

Phishing and Vishing

Phishing is a scam in which you receive a fraudulent e-mail designed to steal your identity or personal information, such as credit card numbers, bank account numbers, debit card PINs, and account passwords. The e-mail may state that your account has been compromised or that one of your accounts was charged incorrectly. The email will…

Often Misused – Identity and Access Management Terms

I agree with Gartner when they say ” IAM (Identity & Access management) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons.”  This practice area is crucial to the maturity of an enterprise’s security posture. Here are six Identity and Access Management Terms, that…

Security as a Service – Resource Pooling

SECaaS, more commonly known as Security as a Service may be in the cloud, or more traditionally be hosted within the customer’s premises.  When you here this term used, people are talking broadly about how companies that have deployed hybrid and traditional enterprise networks using cloud-based services are viewing securing their data in the cloud.…