The Opportunities and Challenges Ahead: A Response to the Cybersecurity Executive Order 

President Biden’s Executive Order serves as an official and intentional first step to modernize cybersecurity defenses, especially as it relates to federal networks, and creating a more definitive response from the U.S. when incidents occur.  Here are a few opportunities and challenges we see ahead! 

Continue reading “The Opportunities and Challenges Ahead: A Response to the Cybersecurity Executive Order “

Starting a new IT security policy? Consider these 8 key policies and procedures

Having the right set of IT security policies in place can help to prevent cyber-attacks and minimize risk.  Check out eight key policies and procedures your organization needs today.

Continue reading “Starting a new IT security policy? Consider these 8 key policies and procedures”

Three Best Practices to Prevent a Supply Chain Attack at Your Organization

The SolarWinds supply chain attack rocked governments and businesses alike in late 2020. Help keep your organization safe with these three key steps.

Continue reading “Three Best Practices to Prevent a Supply Chain Attack at Your Organization”

CMMC: Expert Advice on Cybersecurity Certification Next Steps

The recent release of the Interim DFARS rule has raised a lot of concern and questions among U.S. Department of Defense (DoD) contractors.
Continue reading “CMMC: Expert Advice on Cybersecurity Certification Next Steps”

Humans Hacking Humans: 4 Lessons from Twitter

Three people were charged for their alleged roles in what the Department of Justice has called an attack on “one of the world’s most prolific social media platforms.” Continue reading “Humans Hacking Humans: 4 Lessons from Twitter”

Security Risk
Poses Challenge to
Remote Work

In the past several months, organizations were forced to quickly adapt to “the new normal” of employees working from home on personal devices, while connecting to corporate networks and accessing enterprise assets.  That organizational scenario can be a compliance nightmare, assuming the associated security risk doesn’t already keep you up at night. Continue reading “Security Risk
Poses Challenge to
Remote Work”

Secure Your Network: Learning from Capital One

A 33-year-old woman recently accessed Capital One’s customer data and shared that data on a popular code-sharing website. As data breaches continue to happen almost daily, your organization should understand how breaches occur and proactively prevent unauthorized access to your user’s data. Continue reading “Secure Your Network: Learning from Capital One”

CLIMBERS Innovate Constantly at Girl Scouts Camp CEO STEM

The Girl Scouts of West Central Florida (GSWCF) hosted a Camp CEO STEM weekend at Florida Polytechnic University for girls in high school interested in pursuing a career in science, technology, engineering, and math. Continue reading “CLIMBERS Innovate Constantly at Girl Scouts Camp CEO STEM”

Don’t Get Reeled In: How to Prevent Phishing Scams

Phishing scams are a serious threat to an organization, and they’re increasing in scope, complexity and number – but that doesn’t mean you’re helpless to defend yourself. In fact, it’s easier than ever to proactively protect your organization from threats by following some simple tips.

Continue reading “Don’t Get Reeled In: How to Prevent Phishing Scams”