Spread the Word on Cyber Safety
As you may know, October is cybersecurity awareness month. Each week has a new theme and this week is about the importance of training...
IT Governance & IT Management
Many practitioners use these terms governance and management synonymously. While there is some overlap in practice, there are key...
Cool Writing Tool
I found a really cool web app designed to make writing better and easier and sounds like it would work great for what you guys are doing....
Cybersecurity for Local Governments 2018
2018 update on cybersecurity for local governments. This year marks the rise of the new threat to Local Government from nation states...
Email Flow Rules Help Prevent Scams
A popular attack or threat vector for cybercriminals is to send an email pretending to be from a top-level executive or in the case of...
Cybersecurity Policies Made Easy
People often ask for advice regarding information security or cybersecurity policies. For the remainder of this article, I will use...
Most Popular Cyber Scams
Cyber scams and online fraud continue to evolve. Law enforcement and cybersecurity professionals try to prevent online fraud by...
How to Catch a Liar
Here are a few videos about how to catch people who are lying. This is useful if you are an investigator or auditor. Deception is a key...
Cybersecurity Policy for Local Governments
Here is a sample high-level cybersecurity policy for a city, district, or county. It is designed to be a high-level statement adopted by...
Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...