Managing information technology is about managing potential risk against business efficiency. The CIA Triad can be used to articulate cybersecurity risk in the language of the business.
In celebration of International Talk Like a Pirate Day, Kyle Milaschewski draws a parallel between the Golden Age of Piracy and the current state of cybersecurity. Weaving in historical accounts...
21 Questions to Vet your MSP’s Cybersecurity Posture
December 10, 2020
How secure is your cybersecurity vendor? Because most MSPs hold privileged access to their customers' environments, these questions are a good place to start to gain assurance in your MSP's...
In his trademark humorous style, Brian Wills laments the all-too-common issue of slow home Internet speed and shares tips for troubleshooting a slow home connection.
Helping Security Vendors Understand CMMC: “Use a net, not a harpoon.”
September 29, 2020
Many cybersecurity companies struggle to understand the nuanced requirements of DFARS and CMMC. As a result, government contractors find themselves in the awkward position of being unable to find a...
Taylor Hall likes to work hard. But, as many working in IT and cybersecurity can attest, giving it your all can lead to burnout if you're not careful. In this...
Why the Real Estate Industry Is a Prime Target for Hackers
July 2, 2019
Ryan Heidorn of Steel Root and EJ Whaley of email security company GreatHorn break down the anatomy of the wire fraud scams plaguing the real estate industry.
Which Data Security Regulations Affect My Company?
September 15, 2018
With so many state, federal, and international regulations governing the protection of different data types, we help you identify which laws your organization may be subject to.
U.S. businesses will be impacted by the requirements of the European Union’s General Data Protection Regulation (GDPR), which goes into effect May 25th, 2018.
Everything You Need to Know About the Spectre + Meltdown Vulnerabilities
January 13, 2018
Two recently discovered vulnerabilities, dubbed Spectre and Meltdown, are not the James Bond villains their names suggest. But they are very serious vulnerabilities that organizations should address ASAP.
Small businesses often have a misconception that they are too insignificant to attract the attention of cyber criminals. We explore why that way of thinking can expose small businesses to...
Steel Root co-founder breaks down the key components of a good password and provides tips on how to create strong passwords and practice good password hygiene.