by John Bruggeman | Sep 13, 2022 | Blog, Security
I’m writing this blog post because it needs to be written. It seems pretty obvious that you should test patches to your OS or applications in a test environment that closely matches your production environment before you deploy that patch in production....
by Justin Hall | Aug 17, 2022 | Blog, Security
One of the more fiery topics of discussion amongst security practitioners and luminaries in 2022 is the role of phishing simulation and assessment in an enterprise security control strategy. It has long been gospel that security awareness training is an essential...
by Justin Hall | May 31, 2022 | Blog, Security
Happy summer, everyone! To celebrate, there’s a new Microsoft Windows zero-day vulnerability, currently classified by NVD as CVE-2022-30190, and nicknamed by the community as Follina. It exploits a flaw in the Microsoft Support Diagnostic Tool (MSDT) that uses the...
by John Bruggeman | May 20, 2022 | Blog, Cloud, Security
As I mentioned in my previous post on cloud security, depending on the kind of cloud solution you have, you might be the one responsible for implementing any and all security controls. All major cloud providers have risks and also have ways of implementing controls to...
by John Bruggeman | Feb 1, 2022 | Blog, Security
Cyber security predictions for 2022, what’s on the horizon? Hello everyone, I hope 2022 will be a better year for all of us, and like so many others I have some predictions about what is on the horizon for cybersecurity in the coming year. My predictions are...
by John Bruggeman | Jan 14, 2022 | Blog, Security
Over my past three blog posts, I’ve talked about cyber insurance. The first one covered the topics of what it is and do you need it. The second post discussed what you need to have or know before you make the call to your agent to get a quote. My third post examined...
Recent Comments