Cybersecurity Strategy
Awesome Security content for all skill levels.Recent Security Awareness Posts
Password Manager Quiz: Are You Using One Yet?
Let me know by answering the password manager quiz below. It's much appreciated! [tqb_quiz id='30324'] I personally believe we're beyond the point for needing something to help us remember passwords. I have over 350 logins (passwords) and keeping up with them...
Security Awareness Topic: Portable Media Storage
That awesome spreadsheet you keep on you isn’t the only thing your flash drive can carry. Removable media, or portable media, is a well-known source of malware infections and has been directly tied to the loss of sensitive information in many organizations. Malware...
Security Awareness Topic: Social Engineering
One of the main reasons why a security awareness program needs to exist is to help shed light on common ways organizations get compromised. Amidst a plethora of underground hacking techniques, the common ways social engineers prey on the ignorance of computer users at...
ID Theft Prevention and Personal Finance Security
There’s a lot of free material on protecting your finances but have you actually followed through on any of the tips? This course will help you follow through as a trusted friend would. Click the course image or button below to get started.
- Training for individuals
- 1,000+ students
- $19.99
$49.99
Recent ID Theft Prevention Posts
Mobile Phone Migration Checklist
After upgrading to a Galaxy GS6 I decided it would be a good idea keep a simple inventory of stuff I need to do. Especially since I don't plan on using a premium backup service. Let's go over what you might see in a mobile phone migration checklist. If you're...
Top 5 Pins
What's a Top 5 Passwords list without a good top 5 pins list. Just like passwords though, people usually aren't as good being unique as they think they are. Some don't even try. David Harley originally discussed a data set of common PINs compiled by Daniel Amitay in a...
Top 5 Passwords
Here comes one of my favorite things to look at, the top 5 passwords. It's a good reminder that people aren't as unique as they think they are. It may be a pain to come up with a long, complex password, but the extreme convenience you're using to forgo a secure...
How to Write an Information Security Policy That People Will Actually Read
“If you can’t translate your requirements into effective policy, then you’ve little hope of your requirements being met in an enforceable way,” says Rob McMillan, research director at Gartner. “But if you get it right, it will make a big difference in your organization’s ability to reduce risk.”
The good news: You don't need to reinvent the wheel. Learn from my mistakes and get everyone on the same page in this comprehensive course.
- Training for infosec pros and security teams
- Accepting new students
- $19.99
$199.99
Recent Documentation Posts
Getting Started with Information Security Policies
Information Security Policies are a big part of a comprehensive cybersecurity program. This blog has its share security policy content as this is something I was heavily involved with 4 years ago. But this topic is so important to review, especially if you are just...
Your Trolling Definition is Wrong
It's always good to keep your door open to constructive criticism when creating documents or anything else for that matter. Sometimes you get amazing feedback and sometimes you just get noise. I'm sure you've experienced both ends of the feedback spectrum. In the...
Software Standards for IT Service
If your organization doesn't have a set of software standards, ask yourself or your IT Managers the following questions to begin documenting: What software is mandatory (business critical or daily driver)? What software is required for a particular job or business...