| by Shawn D. Stewart | No comments

Foundations – Access Control

OR Knock, Knock.  Who’s There? Access Controls are more than permissions.  Once you have completed a Risk Assessment and understand your Intellectual Property and its value, you must protect it.  Like everything in business, proper Access Control begins with the written policy that explains who, what, when, where, how, and why individuals, contractors, or devices […]

Read More
| by Shawn D. Stewart | No comments

Practical Power Protection Guide

OR You’ve Got The Power, AC and DC! Technology without electricity?  Our modern way of life would be impossible without it, especially with the level of comfort we have grown accustomed to.  Is it a stretch to say that power, its distribution, and protection, is the life blood of Western Civilization?  Well, maybe, but can […]

Read More
| by Shawn D. Stewart | No comments

Cybersecurity Foundations – Acceptable Use Policy

OR You Didn’t Say I Couldn’t Do It Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra of different technologies, departments, budgets, people, and policies.  To someone unfamiliar, it can be similar to standing at the base of Mount Everest with a secure environment at the summit.  How can you possibly […]

Read More
| by Shawn D. Stewart | No comments

Grid Failure Survival Guide

OR Be The Ants, Not The Grasshopper Disaster Planning covers situations when the unexpected or unprecedented happens in real life.  The East Coast knows hurricanes and other weather events can wreak havoc.  California is well versed in earthquake and wildfire issues.  Flooding is a constant threat in the Plains along with severe weather.  For planning […]

Read More
| by Shawn D. Stewart | No comments

Cybersecurity Foundations – Risk Assessment and BIA

OR Ignorance Is NOT Bliss We continue our climb up the mountain of Cybersecurity to discuss what is often the hardest meeting to schedule with all relevant parties, the Risk Assessment (RA).  The RA is part of a Business Impact Analysis (BIA) that directly feeds policy creation but has the primary effect of shedding light […]

Read More
| by Shawn D. Stewart | No comments

Cybersecurity Foundations – Frameworks and Policy

OR Did You Read the Instructions? Cybersecurity, or security of any kind, is a vast and sometimes complicated orchestra of different technologies, departments, budgets, people, and policies. To someone unfamiliar, it can be similar to standing at the base of Mount Everest with a secure environment at the summit. How can you possibly get there? This entry […]

Read More
| by Shawn D. Stewart | No comments

A One-Sided Cyberwar with Russia

OR That’s Not Yogi Nor Does He Want Your Pic-i-nic Baskets Am I the only one feeling early 80’s vibes? What has possessed the superpowers of the world into this standoff? Beijing won’t stand by idly if things get hot, but not likely before the Olympics end on February 20th. Sure, Communist USSR is gone, but […]

Read More
| by Shawn D. Stewart | No comments

Wrangling and Securing IT Vendors

OR Who Let the Intellectual Property Out? Who? Who? Who? Who? Who? No single vendor can provide for every Information Technology need. I have worked with individual entrepreneurs and Fortune 50 companies and none of them do it alone. Everyone needs outside vendors. The most basic needs require five vendors, and some companies have dozens! That means lots of […]

Read More
| by Shawn D. Stewart | No comments

Building A Better Democracy

OR Secure Your Right…to Election Integrity I was recently asked how to build a secure voting system. There are two schools of thought. 1. Find trustworthy people from all interested parties to both count the paper and oversee the process. 2. Find a secure technology to let freedom ring while keeping pesky hackers out. Unfortunately, from a security standpoint, […]

Read More
| by Shawn D. Stewart | No comments

Horror Stories – ZOMBIES!

OR I Smell Bandwidth! I Want To Eat Your Bandwidth! It’s an age-old debate. Walkers or Runners? Brains or Flesh? Bandwidth or Backdoors? Well, the last refers to a different type of Zombie. These are the devices, either old or improperly configured, that devour your production Internet and network capacity, or just flash a bright red “OPEN” sign to the world. Alert […]

Read More
  • 1
  • 2