| by Shawn D. Stewart | No comments

Cyber Defense – The Meaning of…Technology

OR Not In Front of the Interns! Life is hard enough without constantly worrying about cybercrime.  Did you know cybercrime is now the world’s third largest economy?  These enemies are state-funded and numerous, looking to steal your data, money, and put you completely out of business.  You need Policy, Education, and Technology working together, driven […]

Read More
| by Shawn D. Stewart | No comments

Cyber Defense – Empirical Education

OR Bloody Do-Gooders! Your business has grown to an empire and the barbarians of cybercrime threaten it!  Did you know cybercrime is now the world’s third largest economy?  These enemies are state-funded and numerous, pillaging your data, money, and trying to erase you from the landscape.  You need Policy, Education, and Technology working together, driven […]

Read More
| by Shawn D. Stewart | No comments

Cyber Defense – Kingdom Policies

OR I Told Him We Already Got One The organization is a kingdom and cybercrime has it under siege!  Did you know cybercrime is now the world’s third largest economy?  These enemies are state-funded and numerous, looking to steal your data, money, and put you completely out of business. You need Policy, Education, and Technology […]

Read More
| by Shawn D. Stewart | No comments

Unlocking the Cybersecurity Insurance Questionnaire

OR Insurance.  Why does it always have to be insurance? Congratulations!  Your company survived whatever the heck you call the last two years.  Yes, the storm isn’t over but you made it this far and you are well on your way to finding that treasure of financial success.  Then, your insurance agent sends a questionnaire […]

Read More
| by Shawn D. Stewart | No comments

Foundations – Business Continuity

OR Who You Callin’ A Psycho? What happens if?  Asking this question helps us keep a business (or household) going in the event of an “incident”.  What is an incident?  Oh, it could be anything that is outside the normal, day-to-day operations that disrupt life as we know it.  Doesn’t need to be natural disasters, […]

Read More
| by Shawn D. Stewart | No comments

Foundations – Access Control

OR Knock, Knock.  Who’s There? Access Controls are more than permissions.  Once you have completed a Risk Assessment and understand your Intellectual Property and its value, you must protect it.  Like everything in business, proper Access Control begins with the written policy that explains who, what, when, where, how, and why individuals, contractors, or devices […]

Read More
| by Shawn D. Stewart | No comments

Practical Power Protection Guide

OR You’ve Got The Power, AC and DC! Technology without electricity?  Our modern way of life would be impossible without it, especially with the level of comfort we have grown accustomed to.  Is it a stretch to say that power, its distribution, and protection, is the life blood of Western Civilization?  Well, maybe, but can […]

Read More
| by Shawn D. Stewart | No comments

Cybersecurity Foundations – Acceptable Use Policy

OR You Didn’t Say I Couldn’t Do It Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra of different technologies, departments, budgets, people, and policies.  To someone unfamiliar, it can be similar to standing at the base of Mount Everest with a secure environment at the summit.  How can you possibly […]

Read More
| by Shawn D. Stewart | No comments

Grid Failure Survival Guide

OR Be The Ants, Not The Grasshopper Disaster Planning covers situations when the unexpected or unprecedented happens in real life.  The East Coast knows hurricanes and other weather events can wreak havoc.  California is well versed in earthquake and wildfire issues.  Flooding is a constant threat in the Plains along with severe weather.  For planning […]

Read More
| by Shawn D. Stewart | No comments

Cybersecurity Foundations – Risk Assessment and BIA

OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is often the hardest meeting to schedule with all relevant parties, the Risk Assessment (RA).  The RA is part of a Business Impact Analysis (BIA) that directly feeds policy creation but has the primary effect of shedding light […]

Read More
  • 1
  • 2