Thoughts, Notes & Startup Security How-To's.

Read Article
News, Foundations, Cybersecurity OS
Your Small Business Cybersecurity OS: Our New Product Launch and Big Upcoming Enhancements
Read Article
PrintNightmare, Vulnerability, Windows, Threat Watch, Microsoft
Microsoft PrintNightmare Attack - Your Windows PC is probably vulnerable. Here's what to do about it.
July 7, 2021
Read Article
Ransomware, Cyberattack, Supply Chain Attack
Kaseya Ransomware Attack - What it is and how to protect your startup
July 6, 2021
Read Article
Cyber Security | Infosec Policies | Infosec Training
7 Fast Steps for FTC Safeguards Rule Compliance
March 23, 2021
Read Article
Enterprise Security Questionnaires | Vendor Onboarding
The Questions that 96% of Enterprise Security Questionnaires Ask
March 19, 2021
Read Article
Enterprise Security Questionnaires | Vendor Onboarding
4 Common Tests Requested in a Vendor Security Assessment
March 18, 2021
Read Article
Enterprise Security Questionnaires | Vendor Onboarding
6 Old Fashioned Questions in Vendor Security Assessments
March 17, 2021
Read Article
SOC 2
33 Essentials for Your SOC 2 Readiness Assessment
March 12, 2021
Read Article
Enterprise Security Questionnaires | Infosec Training | Vendor Onboarding
Vendor Risk Assessments & Security Awareness Training
March 9, 2021
Read Article
SOC 2
SOC 2 Readiness Assessment, Contractors, and Commitments
March 4, 2021
Read Article
Cyber Security | Enterprise Security Questionnaires | Vendor Onboarding
Vendor Risk Assessments & Hidden Recurring Commitments
March 3, 2021
Read Article
Cyber Security | Infosec Policies | Vendor Onboarding
The #1 Policy Request in a Vendor Risk Assessment
March 1, 2021
Read Article
Cyber Security | Enterprise Security Questionnaires | Remote Work | SOC 2 | Vendor Onboarding | WFH Cybersecurity
9 Small Business Cybersecurity Wakeup Calls for Founders
February 25, 2021
Read Article
SOC 2
The Fundamental Flaw in Your SOC 2 Compliance Checklist
February 17, 2021
Read Article
SOC 2
Getting Ready for a SOC 2 Readiness Assessment
February 15, 2021
Read Article
Infosec Policies | Vendor Onboarding
Subject to the FTC Safeguards Rule? Your first 3 steps.
February 9, 2021
Read Article
SOC 2
SOC 2 Readiness Assessment: Commitments to Customers
February 5, 2021
Read Article
Cyber Security | Remote Work | WFH Cybersecurity
When Small Business Cybersecurity Meets BYOL
February 3, 2021
Read Article
SOC 2
SOC 2 Obligations for Board of Directors Members
February 2, 2021
Read Article
SOC 2
SOC 2 Compliance Checklist #Fails
February 1, 2021
Read Article
Cyber Security | Infosec Policies | SOC 2
Movies, Photographs, and SOC 2 Type 1 vs Type 2
January 29, 2021
Read Article
HIPAA
HIPAA & Disposal of Protected Health Information
January 29, 2021
Read Article
Cyber Security
iOS Security: Please Upgrade to iOS 14.4 Today
January 27, 2021
Read Article
Cyber Security | Remote Work | WFH Cybersecurity
4 Tough Q's: Remote Work & Small Business Cybersecurity
January 26, 2021
Read Article
Cyber Security
9 Tips for your Small Business Network Setup Checklist
January 25, 2021
Read Article
Cyber Security | Remote Work | WFH Cybersecurity
When WFH Threats meet Xfinity Router Security
January 21, 2021
Read Article
Cyber Security
Why SMBs Prefer an Outsourced Data Protection Officer
January 17, 2021
Read Article
Cyber Security
7 Steps Toward IRS Cybersecurity Standards Compliance
January 15, 2021
Read Article
Cyber Security
How Small Businesses Look Big with NIST Control Families
January 14, 2021
Read Article
Cyber Security
MSP vs MSSP: Assembling Your IT & Security Team
January 12, 2021
Read Article
Cyber Security
FTC Safeguards Rule & The Rising Cybersecurity Bar
January 11, 2021
Read Article
Cyber Security
When an MSSP is too much for your small business
January 5, 2021
Read Article
Cyber Security
The Startup Guide to IT Risk Assessment
January 2, 2021
Read Article
Cyber Security
Cybersecurity in 2020
December 30, 2020
Read Article
Cyber Security
Small Business Cybersecurity in 2020: By The Numbers
December 27, 2020
Read Article
Phishing
Where to Point Your Phishing Simulations: Your Options
December 27, 2020
Read Article
Phishing
Phishing Simulation Emails: Avoiding a Nightmare
December 26, 2020
Read Article
Enterprise Security Questionnaires | Infosec Policies
Uncovering Hidden Annual Security Requirements
December 26, 2020
Read Article
Enterprise Security Questionnaires | SOC 2
SOC 2 Compliance Checklist: Pre-Audit Steps
December 26, 2020
Read Article
Cyber Security
11 Web Vulnerability Scan Essentials for B2B SaaS Websites
December 22, 2020
Read Article
Cyber Security
Tech Startup Primer on FedRAMP Security Controls Baseline
December 17, 2020
Read Article
Phishing
Spear Phishing Training: Advanced Tuning & Targeting
December 17, 2020
Read Article
Phishing
Email Security Best Practices: External Mail Tagging
December 17, 2020
Read Article
Cyber Security | Phishing | Smishing
Smishing Example: 7 Reasons This Message Is Suspicious
December 15, 2020
Read Article
Cyber Security | Implementation | Infosec Policies
The Wasteful Pursuit of Security Theater
December 12, 2020
Read Article
Cyber Security
What is a Honeypot? And why doesn't it have Honey?
December 11, 2020
Read Article
Cyber Security
13,354 Reasons for COVID-era Internal Network Scans
December 10, 2020
Read Article
Cyber Security
When IT Asset Inventory is the Missing Link
December 9, 2020
Read Article
Enterprise Security Questionnaires | SOC 2
5 Easy Shortcuts on Enterprise Security Questionnaires
December 7, 2020
Read Article
Cyber Security | Infosec Policies | Infosec Training
Your Incident Response Plan depends on Talent Acquisition
December 7, 2020
Read Article
Shadow IT
Weekends are where Shadow IT starts
December 4, 2020
Read Article
Cyber Security
Insecure Email Wall of Shame: Banking Edition
December 3, 2020
Read Article
Cyber Security | Password Managers | Remote Work | Shadow IT | WFH Cybersecurity
Totally Avoidable Work-From-Home Security #Fails
November 30, 2020
Read Article
Cyber Security
The 3 Most Misunderstood Cybersecurity Terms
November 29, 2020
Read Article
Cyber Security | Smishing
5 Small Biz Cybersecurity Survival Tips for Cyber Monday
November 24, 2020
Read Article
Cyber Security
How can I limit G Suite Calendar Sharing to Free/Busy?
November 24, 2020
Read Article
Cyber Security
Budget Denied: Information Systems Security Officer Role
November 24, 2020
Read Article
Password Managers
9 Foolish Ways to Erode Your Password Manager Security
November 23, 2020
Read Article
Phishing
113 of our Favorite Phishing Simulation Emails
November 16, 2020
Read Article
Infosec Policies
How BYOD Policies Catch You Up to Reality
November 12, 2020
Read Article
Infosec Policies
Good Security Programs Begin and End with Policy?
November 11, 2020
Read Article
Cyber Security | Infosec Policies | Infosec Training | Phishing
Email Security Best Practices for Employees
November 10, 2020
Read Article
Phishing
The Hidden Link between UNC Path Injection and Phishing
November 5, 2020
Read Article
Cyber Security | Implementation
Culture Club: Creating a Company Culture for Security
November 4, 2020
Read Article
Cyber Security | Infosec Training | Phishing
Phishing Training: A Holistic Approach
November 3, 2020
Read Article
Cyber Security | Phishing | WFH Cybersecurity
Email Security Best Practices for Avoiding Common Threats
October 30, 2020
Read Article
HIPAA
HIPAA & Media Sanitization: Clear, Purge, and Destroy
October 30, 2020
Read Article
Cyber Security | Phishing
Business Email Compromise 💗s Urgency
October 30, 2020
Read Article
Cyber Security | WFH Cybersecurity
What does WFH minus DNS Filtering equal?
October 30, 2020
Read Article
Cyber Security | HIPAA
Protected Health Information: A Cybersecurity Perspective
October 29, 2020
Read Article
Implementation
How to Create an Email Policy to Protect Your Company
October 28, 2020
Read Article
Cyber Security | WFH Cybersecurity
The Dangers of Working from Home for Cybersecurity
October 24, 2020
Read Article
Cyber Security | Implementation
How a GDPR Data Protection Officer Boosts Cybersecurity
October 23, 2020
Read Article
Cyber Security | Enterprise Security Questionnaires | SOC 2
Getting by Without SOC 2 Type II
October 22, 2020
Read Article
Cyber Security | Man-in-the-Middle | Ransomware
Cybersecurity Awareness Month: The 5 Most Bizarre Hacks
October 21, 2020
Read Article
Phishing
How To Check Spam on Gmail
October 21, 2020
Read Article
Phishing | Smishing
Do you recognize this smishing example?
October 20, 2020
Read Article
Enterprise Security Questionnaires | Vendor Onboarding
Compensating Controls and Campfires
October 19, 2020
Read Article
Cyber Security | Phishing
Is this link safe? Human vs Machine Techniques
October 15, 2020
Read Article
Cyber Security | Vendor Onboarding
Vendor Risk Management & Nobody Gets Fired for Hiring IBM
October 15, 2020
Read Article
Cyber Security
The Best Defense Against Malware for Your Company
October 14, 2020
Read Article
Cyber Security | Password Managers | WFH Cybersecurity
Business vs Consumer Password Management Essentials
October 12, 2020
Read Article
Cyber Security | Enterprise Security Questionnaires | Vendor Onboarding
6 Key Vendor Risk Assessment Conversations
October 8, 2020
Read Article
Cyber Security | WFH Cybersecurity
Business Continuity Plan vs Disaster Recovery Plan
October 7, 2020
Read Article
Cyber Security | Enterprise Security Questionnaires | Vendor Onboarding
What's Broken about Enterprise Security Questions
October 7, 2020
Read Article
Cyber Security | Implementation
InfoSec Policies & The Feeling of Uncertainty
October 6, 2020
Read Article
Cyber Security | Enterprise Security Questionnaires | Implementation | Vendor Onboarding
Risk Grading for Enterprise Compliance Directors
September 25, 2020
Read Article
Cyber Security | Implementation
7 Crucial Questions to Ask When Choosing an MSP
September 22, 2020
Read Article
Cyber Security
Cybersecurity Awareness Training for Small Business
September 17, 2020
Read Article
Cyber Security | WFH Cybersecurity
WFH Cybersecurity: Fact vs Fiction
September 17, 2020
Read Article
Cyber Security | Phishing | WFH Cybersecurity
DNS Filtering, Malicious Traffic Filtering, & Phishing Protection
September 17, 2020
Read Article
Cyber Security | Shadow IT | WFH Cybersecurity
Why does Shadow IT exist? You Asked, We'll Answer!
September 15, 2020
Read Article
Cyber Security | Implementation
Infosec Dashboard Trends - Best Practices
September 6, 2020
Read Article
Cyber Security | Phishing | Ransomware
Can Macs Get Viruses, Part 2
September 5, 2020
Read Article
Cyber Security
What is UNC Path Injection?
September 4, 2020
Read Article
Cyber Security
Prove that you are Cybersecure
September 4, 2020
Read Article
Cyber Security | Man-in-the-Middle
Your SSL Certificate is Expiring Soon(er)
September 1, 2020
Read Article
Cyber Security | WFH Cybersecurity
Infosec Policy Acknowledgement in the COVID Era
August 26, 2020
Read Article
Cyber Security | Implementation | Phishing
What is DNS Filtering, and why do you need it?
August 24, 2020
Read Article
Cyber Security
What is a CVE?
August 20, 2020

Ready to get started?

We have generous free tiers available to get you started right away.