Blog
Blog

Do I Need An Incident Management Process?

Does your organization have a defined incident management or problem management process?  If not, it may be a good idea to spend some time formally defining your incident management process and plan for how your technology and cybersecurity teams respond to incidents.  Having even a simple incident management…

Blog

[Attention IT Departments] Federal Cybersecurity Advisory Issued

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) released a joint cybersecurity advisory regarding cyber threats from ransomware. The advisory includes actions to take today to mitigate these threats. We…

Blog

Geofencing - what is it and why should you consider using it?

A geofence is a type of virtual perimeter for a real-world geographic area.  Geofencing has many uses that can vary widely, from smart devices and appliances to marketing / audience engagement to security and human resources. 

The most popular use-case is as more of a security mechanism, such as…

Blog

PACK EXPO International Cybersecurity Briefing

Heading to PACK EXPO International in a few weeks?  You’ll want to keep the following in mind to ensure a safe and secure experience while at the show.

Wireless Connectivity

A guest wireless network will be available for you to use while you are on-site at McCormick Place.  The network…

Blog

Wireless Security – What do I need?

There are varying levels of wireless security that you can employ on your Wi-Fi networks ranging from completely open to tightly secured.  Here is a look at the various security protocols you should consider employing on your wireless networks:

Wired Equivalent Privacy (WEP) – the oldest and most commonly…

Blog

CIS Version 8 of the Critical Internet Security Controls

In May of 2021, the Center for Internet Security released version 8 of their Critical Security Controls framework.  With this major version update came a number of additions to keep up with the evolution of cyber threats and changing uses of technology that need to be considered for security.  Some of these…

Blog

Anti-Malware Tools - What's the difference and why do I need one?

Antivirus and anti-malware tools have come a long way in the past several years.  These tools originally functioned by simply scanning your computer for infected files, and eventually evolved to become more proactive by scanning downloaded files and inbound e-mails as they were downloaded to your computer. …

Blog

Network Security – Where do I begin?

It’s a safe bet that most computer networks have some basic security mechanisms in place such as firewalls or passwords on wireless networks.  Unfortunately maintaining basic network security isn’t enough anymore to protect your company from potential cyberattacks.  Network security can also get complex and…

Blog

How Do I Know What’s On My Network?

The first step towards protecting your computer network is to know exactly what is connected to it.  In fact, it’s the reason why having an “Inventory and Control over Enterprise Assets” is the first control in the CIS List of 18 Critical Information Security Controls.  However, many companies have devices…

Blog

Security Policies – What Do You Really Need?

Many organizations struggle to find the right level of formality when it comes to documented security policies.  Smaller manufacturers in particular may struggle with having too few policies or not having the right policies to cover the breadth of topics needed to properly secure their technology assets and guide…