BlogDelicious content for your skill-up pleasure.
Every organization should have a security awareness program. If you don't, start making preparations to run one. One area you can start is instruction on the dangers of phishing. The Security Awareness category on Best of Roy will show topic ideas to keep in mind for...
Why did I decide to write cyber thrillers? Because we've gone from the Cold War to the Code War.
Quote by Thomas Waite, Novelist
There are probably a ton of cybersecurity implementation myths. Here's the big 4: 1 If we focus on security, we won’t be able to accomplish as much. Security doesn’t have to compromise productivity; it can be part of it. Think of vetting devices, solutions, or even...
You can't hold firewalls and intrusion detection systems accountable. You can only hold people accountable.
Quote by Daryl White, DOI CIO
HIPAA, the Health Insurance Portability and Accountability Act, defines patient rights and standards for protecting health information. We briefly explored this topic in the post Exploring Regulated Information: HIPAA Data back in December. Now let's go into a HIPAA...
A computer lets you make more mistakes faster than any invention in human history – with the possible exceptions of handguns and tequila.
Quote by Mitch Ratliff, Author of Creating a Learning Culture
It’s easy to tune out headlines on breaches and other cybercrime because it happens so often and with an increasing number of breached records. In some cases, we saw triple-digit increases in 2015 breach costs over 2014 . This can't be a recurring issue. It's time...
Recommended addition to the Consumer Privacy Bill of Rights: A right to not have your data rise up and attack you.
Quote by Benjamin Wittes, Brookings Institution
The Department of Homeland Security (DHS) defines cybersecurity insurance  as guaranteed coverage for a variety of cyber incidents. This topic can go pretty deep but this post will briefly cover cybersecurity insurance basics. The types of cyber incidents this...
Eighty percent of the intrusions of your networks today can be handled by patches, anti-virus and user actions. We spend 90 percent of our time on the 80 percent of the issues that could be handled by good hygiene.
Quote by Brigadier General Paul Nakasone, Deputy Commander, U.S. Army Cyber Command
It's always good to keep your door open to constructive criticism when creating documents or anything else for that matter. Sometimes you get amazing feedback and sometimes you just get noise. I'm sure you've experienced both ends of the feedback spectrum. In the...
Security breaches usually entail more recovery efforts than acts of God. Unlike proverbial lightning, breaches of security can be counted on to strike twice unless the route of compromise has been shut off.
Quote by FedCIRC
Helping you study and earn IT and security certifications. Stick around for what comes next, the job!
You're your own best tech. Learn the basics of IT troubleshooting here.
Helping you raise your income when you're underpaid and underappreciated so you have more money to reinvest in yourself.