The big question today is what is cybersecurity compliance? When researching this, I found a very formal definition saying that cybersecurity compliance is, at its core adhering to standards and regulatory...Read More
As many of you know, unless I'm out of town, I sit here on the deck and share some cybersecurity tips, tricks and hints with you to provide some practical things that you can do to help keep yourself, your family and...Read More
Last week we went through a brief overview of the primary functions of the cybersecurity framework. This week we'll dive a bit deeper into the identify and protect functions. The activities and the identify function...Read More
Last week I introduced the National Institute of Standards and Technology Cybersecurity Framework, commonly referred to as the CSF and its primary functions. Identify, protect, detect, respond and recover. What are...Read More
Storing passwords and credit cards in your browser is a huge open door for hackers, so please don't do it ever. First issue is that anyone and it doesn't even have to be a cybercriminal who sleeps around your...Read More
Many people out there think that if they have a trial version of an antivirus program on their computer that came with that computer several years ago when they bought it and has never, ever been updated, it will...Read More
Most of or maybe all of us have clicked on a phishing email at some point in our lives. Most of them were easy to spot only a few years ago. But even then, if you were in a hurry or distracted by something, you...Read More
Today, I'm going to have a slightly different focus and talk about compliance instead of cybersecurity. Specifically, I'll discuss my thoughts from attending a virtual Cybersecurity maturity Model certification town...Read More
Read More
Read the rest of his inspiring story on how TechSage Solutions became the business it is today.
The Compliance Formula simplifies complex compliance challenges, equipping businesses to achieve CMMC certification and protect against costly cyber threats. Written by top IT leaders, this book is essential for organizations seeking to win Department of Defense contracts, enhance security, and avoid the financial and legal risks of non-compliance.