Cybersecurity StrategyAwesome Security content for all skill levels.
Recent Security Awareness Posts
Black Friday and Cyber Monday are almost upon us. Expect not only increased conscious spending but increased “scampaigns” as well. It's more important than almost any other time of the year to stay safe during the busy holiday shopping season. This is just a friendly...
ID Theft Prevention and Personal Finance Security
There’s a lot of free material on protecting your finances but have you actually followed through on any of the tips? This course will help you follow through as a trusted friend would. Click the course image or button below to get started.
- Training for individuals
- 1,000+ students
Recent ID Theft Prevention Posts
The internet is a public place. Don't be fooled into thinking you are completely anonymous. Before you install any program or browse any website, harden your system to mitigate internet attacks. Software creators often implement an ability to "phone home." Most of the...
Antivirus removal tools are a staple in every tech's toolbox. Why? You'll end up using them more than you think. You should uninstall your programs, including antivirus programs, through Add/Remove Programs or you can use applications such as Wise Program Uninstaller...
It's becoming more and more popular to use your Android phone as a portable scanner. If you haven't bought into the smartphone craze to replace functions that you'd normally have to do at your desktop, let me give you a few tips for scanning documents on the go with...
How to Write an Information Security Policy That People Will Actually Read
“If you can’t translate your requirements into effective policy, then you’ve little hope of your requirements being met in an enforceable way,” says Rob McMillan, research director at Gartner. “But if you get it right, it will make a big difference in your organization’s ability to reduce risk.”
The good news: You don't need to reinvent the wheel. Learn from my mistakes and get everyone on the same page in this comprehensive course.
- Training for infosec pros and security teams
- Accepting new students
Recent Documentation Posts
In last week's post, Exploring 3 Different Types of IT Documentation, we briefly touched on policies as one of the three common types of documentation. The importance of IT policies cannot be overstated. Policies are very important as they portray an organization's...
Although there are clear boundaries of document types in theory, what a type of document actually is and should be can vary depending on who you talk to. There are some people who add procedures in with policies and add standards to procedures. These types of people...
As IT progresses more into service management, it's good to raise a little above the operation piece of IT and get into the organization piece. Historically IT professionals balked at "time wasting" stuff like this but I'm happy to improve knowledgebase article...