top of page
Search


Passwords and Multi-factor
Everyone hates having to remember long passwords. As time has gone on, passwords have had to get longer. We started adding complexity. We...
Aug 10, 20232 min read


Cyber Hygiene- Know what you have
Do you know where all your devices are? Do you know where all your sensitive data is? If you don't your not alone. Many people have...
Aug 3, 20232 min read


Cyber Hygiene- Backing Up Regularly
We hear about ransomware attacks all the time. We feel awful for the people who have lost all their pictures. Or the company that has to...
Jul 27, 20232 min read


Cyber Hygiene- Anti-malware Scanning
Anti-malware is a vital tool to protect your systems no matter what the operating system and device type. There are many free options. We...
Jul 10, 20231 min read


Cyber Hygiene- Keeping Things Up To Date
In my time as a cyber engineer I have met many people that would prefer to stick their head in the sand and do nothing. There is a...
Jun 23, 20232 min read


Visualizing Risk
It can be challenging for people to understand risk. As cybersecurity engineers we can say xyz is a high risk, but all to often...
Jan 31, 20212 min read


Risk Balance
Having a risk based approach to managing cybersecurity is critical. All data and information systems can not be protected at the same...
Jan 31, 20212 min read


What is Risk?
Risk is a critical cybersecurity concept. A risk is a vulnerability or weakness exposed to a threat and the consequences if that that...
Jan 15, 20212 min read


Supply Chain Cybersecurity
You are only as secure as your weakest link. To do business in today's world requires different systems and connections often on a global...
Jan 2, 20211 min read


Small Business Cybersecurity
Smaller Organizations Often Do Not Think They Have Issues When we first started A&P we were amazed at the number of smaller organizations...
Oct 12, 20194 min read


Cloud Security Evaluation
You've decided to use a cloud provider. That way all your data will be available to you no matter where you log in from and the cloud...
Jan 29, 20191 min read


IoT Security
# IoT Security These days there is a device or an app for almost anything you can think of. There are smart crock pots, refrigerators,...
Jan 21, 20191 min read


Quantifying Risk
One of the things we like to do when we do risk assessments is truly understand what is important and what potential threats could do to...
Sep 30, 20182 min read


Cyber Education
With over ten years working in the cybersecurity field and many years of college focusing on cybersecurity, cyber has become a way of...
Sep 24, 20182 min read
Know What Your Protecting
Do you know all the information systems in your business? Do you know what software systems are in use across your company? Do you all...
Sep 9, 20182 min read


Cyber Risk
Cybersecurity breaches are in the news all the time. People hear about things happening yet persist in thinking it can’t happen to them....
Jun 11, 20171 min read
bottom of page