Blog

Delicious content for your skill-up pleasure.
Security Awareness Topic: Phishing

Security Awareness Topic: Phishing

Every organization should have a security awareness program. If you don't, start making preparations to run one. One area you can start is instruction on the dangers of phishing. The Security Awareness category on Best of Roy will show topic ideas to keep in mind for...

read more
4 Cybersecurity Implementation Myths

4 Cybersecurity Implementation Myths

There are probably a ton of cybersecurity implementation myths. Here's the big 4: 1 If we focus on security, we won’t be able to accomplish as much. Security doesn’t have to compromise productivity; it can be part of it. Think of vetting devices, solutions, or even...

read more
A Deep Dive Into HIPAA

A Deep Dive Into HIPAA

HIPAA, the Health Insurance Portability and Accountability Act, defines patient rights and standards for protecting health information. We briefly explored this topic in the post Exploring Regulated Information: HIPAA Data back in December. Now let's go into a HIPAA...

read more
Cybersecurity Insurance Basics

Cybersecurity Insurance Basics

The Department of Homeland Security (DHS) defines cybersecurity insurance [1] as guaranteed coverage for a variety of cyber incidents. This topic can go pretty deep but this post will briefly cover cybersecurity insurance basics. The types of cyber incidents this...

read more

Eighty percent of the intrusions of your networks today can be handled by patches, anti-virus and user actions. We spend 90 percent of our time on the 80 percent of the issues that could be handled by good hygiene.

Read more

Brigadier General Paul Nakasone on Intrusions

Quote by Brigadier General Paul Nakasone, Deputy Commander, U.S. Army Cyber Command

read more
Your Trolling Definition is Wrong

Your Trolling Definition is Wrong

It's always good to keep your door open to constructive criticism when creating documents or anything else for that matter. Sometimes you get amazing feedback and sometimes you just get noise. I'm sure you've experienced both ends of the feedback spectrum. In the...

read more

Security breaches usually entail more recovery efforts than acts of God. Unlike proverbial lightning, breaches of security can be counted on to strike twice unless the route of compromise has been shut off.

Read more

FedCIRC on Security Breaches

Quote by FedCIRC

read more

Categories

Archives

Merged Projects

Helping you study and earn IT and security certifications. Stick around for what comes next, the job!

You're your own best tech. Learn the basics of IT troubleshooting here.

Helping you raise your income when you're underpaid and underappreciated so you have more money to reinvest in yourself.

Pin It on Pinterest