We’ve merged with C3 Integrated Solutions! Learn how our merger will accelerate your CMMC compliance Read more >>


Close up of modern building with stepped architectural levels

The CEO’s Cybersecurity Playbook

October 13, 2021

Managing information technology is about managing potential risk against business efficiency. The CIA Triad can be used to articulate cybersecurity risk in the language of the business.

Learn More
Photo of a tall ship with old fashioned sails and rigging sailing on the ocean

The Golden Age of Modern Piracy

September 17, 2021

In celebration of International Talk Like a Pirate Day, Kyle Milaschewski draws a parallel between the Golden Age of Piracy and the current state of cybersecurity. Weaving in historical accounts...

Learn More
Woman in black shirt using a laptop computer leans against a glass wall with racks of servers behind her.

21 Questions to Vet your MSP’s Cybersecurity Posture

December 10, 2020

How secure is your cybersecurity vendor? Because most MSPs hold privileged access to their customers' environments, these questions are a good place to start to gain assurance in your MSP's...

Learn More
A tablet device with a digital outline of a human face

How to Protect your Android Phone from Malware

December 9, 2020

Faced with increasing reports of mobile malware on Android, Taylor Hall shares insights on how to stay protected.

Learn More
Close up photo of a mobile phone running an Internet speed test

Bandwidth Bandaids

November 27, 2020

In his trademark humorous style, Brian Wills laments the all-too-common issue of slow home Internet speed and shares tips for troubleshooting a slow home connection.

Learn More
Man standing in a boat pulling in a fishing net with palm trees in the background

Helping Security Vendors Understand CMMC: “Use a net, not a harpoon.”

September 29, 2020

Many cybersecurity companies struggle to understand the nuanced requirements of DFARS and CMMC. As a result, government contractors find themselves in the awkward position of being unable to find a...

Learn More
Photo of a blue neon sign reading

Sustainable Hustle: Work Hard, Burn Less

August 20, 2020

Taylor Hall likes to work hard. But, as many working in IT and cybersecurity can attest, giving it your all can lead to burnout if you're not careful. In this...

Learn More

Cybersecurity Awareness for Employees: Tips and Best Practices

June 24, 2020

COVID-19 has changed the landscape entirely, making cybersecurity a much bigger business threat than ever before.

Learn More
Photo of soapy hands being washed in a stainless steel sink

PlzCoverYourCough2020!: Passwords, Security, and Hygiene

June 18, 2020

Brian Wills shares password tips and security hygiene advice in this humorous blog post.

Learn More
Photo of a modern open-concept office with empty desks.

Post-COVID Productivity

June 8, 2020

Taylor Hall shares productivity tips for teams adjusting to work in a post-COVID world.

Learn More
Photo of a desk with a laptop computer, open journal with a pen, and a computer mouse on a leather mouse pad.

Be a Security Champion for your Organization

May 18, 2020

Taylor Hall shares tips to help you carry the banner of digital security for your company.

Learn More
Photo of a hand holding two keys on a key ring in the shape of a house

Nothing Says “Happy Mothers Day!” like a Hardware Token of Your Appreciation.

May 5, 2020

Brian Wills extols the virtues of multi-factor authentication and suggests Mom might like a FIDO U2F token for Mother's Day.

Learn More
Photo of two human skeleton decorations in front of a house lit up with orange lights.

13 Ways to Avoid Security Scares

October 3, 2019

October means Halloween and National Cybersecurity Awareness Month. We share 13 tips for staying safe all year.

Learn More
Photo of the United States Capitol building

Best Defense for a DFARS Audit? Pick the Right Partner.

August 5, 2019

Ryan Heidorn describes five qualities to look for in a service provider to help achieve DFARS compliance.

Learn More
Aerial photo of a bunch of residential houses

Why the Real Estate Industry Is a Prime Target for Hackers

July 2, 2019

Ryan Heidorn of Steel Root and EJ Whaley of email security company GreatHorn break down the anatomy of the wire fraud scams plaguing the real estate industry.

Learn More
Photo of a building interior with large Microsoft logo

New Threat: Microsoft Azure Custom Domains

June 6, 2019

Attackers are leveraging Microsoft Azure custom domains to create phishing and malware links that are difficult to spot.

Learn More
Photo of a man sitting in front of a desk with his back to the camera. His head partially obscures a computer which has the numbers

How Work Culture Impacts Cyber Security

May 20, 2019

We break down six reasons why work culture plays an important role in an organization's overall security posture.

Learn More
Close-up photo of a glass door that says

Hackers Using LinkedIn to Spread Malware

March 6, 2019

Attackers posing as recruiters on LinkedIn are conducting a social engineering scam using potential job openings as bait.

Learn More
Photo of a Herschel backpack in a man's lap, with the man's hands folded on top of the backpack and holding an iPhone

Protect Your Phone From Port-Out Scams

February 5, 2019

Thieves are stealing phone numbers by switching mobile carriers—and stealing personal data, too.

Learn More
Women standing in front of a building, looking up at dozens of security cameras mounted on the building and pointed toward them.

The Current State of U.S. Privacy Law

January 28, 2019

It’s 2019, and data privacy has never been more important. This is what's going on in U.S. data privacy law today.

Learn More
Close up photo of a hand holding a sparkler firework with sparks flying

Cybersecurity Predictions for 2019

January 1, 2019

Steel Root co-founder Ryan Heidorn muses on cybersecurity predictions for the year ahead.

Learn More
Hand holding a black Android smartphone with the Venmo app on the screen and the text

“Just Venmo Me”

October 28, 2018

We share tips and considerations for safely using popular digital pay apps like Venmo.

Learn More
Steel Root co-founder Ryan Heidorn on the top deck of the Mahi Mahi cruise boat in Salem MA, speaking into a microphone

Steel Root Summer Cruise

September 22, 2018

Photo recap of the Steel Root 2018 Summer Cruise! We had a blast and look forward to seeing everyone next year.

Learn More
Photo of two open books on a table with a blurry bookshelf behind them.

Which Data Security Regulations Affect My Company?

September 15, 2018

With so many state, federal, and international regulations governing the protection of different data types, we help you identify which laws your organization may be subject to.

Learn More
Black and white photo of a telephone pole with advertisements attached, including one that says

Data Privacy Laws Like GDPR Are Coming to the U.S.

July 19, 2018

In the absence of a unified federal law governing data privacy rights in the United States, states like California are filling the void.

Learn More
Photo of a Nest smart thermostat set to 63 degrees and mounted on a white wall.

How to Keep Your Smart Devices Secure

July 10, 2018

Steel Root systems engineer Kevin Le describes the Internet of Things and why so-called "smart" devices may pose security challenges.

Learn More
Screen capture from the Disney movie Smart House. A boy (Ryan Merriman) is poking his head through a doorway and there is a futuristic-looking display mounted on the wall.

How to Be Smart About Your Smart Home

May 29, 2018

As more consumers adopt so-called "smart" technology, we explore some security fundamentals to help you make smart decisions about technology.

Learn More
Photo of an ATM machine beneath a neon sign reading

How to Avoid ATM Skimmers

May 9, 2018

The use of ATM skimmers to steal debit card information is on the rise. We break down the anatomy of the attack to help you stay secure from thieves.

Learn More
EU flags at the European Commission Berlaymont building

Is Blocking European Visitors to Your Website a Valid GDPR Strategy?

May 6, 2018

We got caught up in a viral Twitter debate about whether U.S. businesses could comply with GDPR by blocking European visitors from their website.

Learn More
Photo of four Steel Root employees at the North Shore Business Expo standing in front of the Steel Root booth with a pull-up banner in the background that says

How Local Businesses View Cybersecurity

April 5, 2018

We surveyed attendees of last month's North Shore Business Expo to understand how local businesses view the importance of cybersecurity.

Learn More
Map of Europe

U.S. Businesses Should Prepare for GDPR

February 22, 2018

U.S. businesses will be impacted by the requirements of the European Union’s General Data Protection Regulation (GDPR), which goes into effect May 25th, 2018.

Learn More
ESET company logo and tagline that reads

ESET North American Partner Conference: What to Expect in 2018

February 13, 2018

Lessons learned from ESET's 2018 North American Partner Conference. Here's what to expect in the year ahead.

Learn More
Two clear, long-stemmed martini glasses on a table with a plate of green olives.

Everything You Need to Know About the Spectre + Meltdown Vulnerabilities

January 13, 2018

Two recently discovered vulnerabilities, dubbed Spectre and Meltdown, are not the James Bond villains their names suggest. But they are very serious vulnerabilities that organizations should address ASAP.

Learn More
Close up photo of hands typing on an Apple Macbook laptop

10 Simple Ways to Stay Safer Online

November 30, 2017

In a world where we increasingly rely on Internet-connected devices in all aspects of our lives, we share 10 simple tips for staying safe online.

Learn More
Chalkboard in a storefront window that says

Why Small Businesses Need Cybersecurity

November 20, 2017

Small businesses often have a misconception that they are too insignificant to attract the attention of cyber criminals. We explore why that way of thinking can expose small businesses to...

Learn More
Close up photo of a WiFi module on a computer motherboard

Everything You Need to Know About the Krack WiFi Vulnerability

October 18, 2017

Learn More
Open padlock emblazoned with the word Equifax

Equifax Hack: How to Secure Your Credit

September 12, 2017

Advice on how consumers should respond to the massive Equifax breach that exposed the personal information of hundreds of millions of Americans.

Learn More
Hand holding an iPhone with shadow behind it on a blue table

Beyond Passwords: Securing Your Accounts Like a Pro

August 2, 2017

Using multifactor authentication is a free and easy way to drastically improve the security of your online accounts.

Learn More
Close up photo of a password field with a bunch of asterisks concealing the password

What Makes a Good Password?

July 7, 2017

Steel Root co-founder breaks down the key components of a good password and provides tips on how to create strong passwords and practice good password hygiene.

Learn More