Search Results

We found – 50 articles for cyber
Cybersecurity Risk Assessment Common Findings: Account Management

Cybersecurity Risk Assessment Common Findings: Account Management

What are the most common gaps found within companies, when performing a formal cybersecurity risk assessment? In the video below, Mike explains the most common findings within CIS Control #5 – Account Management. Want Mike’s recommendations on the best vendors

Read more ›

Cybersecurity Risk Assessment Common Findings: Configuration of Enterprise Assets and Software

Cybersecurity Risk Assessment Common Findings: Configuration of Enterprise Assets and Software

What are the most common findings of a cybersecurity risk assessment, in regards to the configuration of enterprise assets and software? In the video below, Mike explains why IoT devices and USB drives are the most common gaps found in

Read more ›

Cybersecurity Risk Assessment Common Findings: Data Protection

Cybersecurity Risk Assessment Common Findings: Data Protection

What are the most common findings, when a 3rd party performs a cybersecurity risk assessment for a company, specifically in regards to data protection? In the video below, Mike explains a few easy things your company can implement for data

Read more ›

Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls

Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls

What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in

Read more ›

Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control

Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control

When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but

Read more ›

Cybersecurity Risk Assessment Steps

Cybersecurity Risk Assessment Steps

What steps are involved in a cybersecurity risk assessment? In the video below, Mike Smith explains his opinion on the 11 steps involved in a cybersecurity risk assessment, and the order in which they should be taken. Want Mike’s recommendations

Read more ›

The Best Business ISPs for Large, Multi-Site Companies

The Best Business ISPs for Large, Multi-Site Companies

You’re working for a large organization, with multiple sites. But with two ISPs at every site, ISP management is getting insane. You have tons of account numbers, a dozen ISPs with a dozen phone numbers, and staggered contract expiration dates.

Read more ›

SD-WAN Vendors: 5 Questions to Narrow Your Comparison – A Broker’s Perspective

SD-WAN Vendors: 5 Questions to Narrow Your Comparison – A Broker’s Perspective

Your company is in the market for SD-WAN vendors, but not sure where to start. In this video, I explain the best 5 questions to narrow your comparison options. Want my recommendations on the best SD-WAN solutions that your company

Read more ›

What is a Virtual CISO?

What is a Virtual CISO?

What is a Virtual Chief Information Security Officer (vCISO)? In the video below, Mike details the attributes of a good Virtual CISO, and also tells you the various services that they offer. He also compares this to other cybersecurity services,

Read more ›

Managed Detection and Response Providers Comparison: Endpoint Tools

Managed Detection and Response Providers Comparison: Endpoint Tools

Your company is comparing Managed Detection and Response (MDR) providers for cybersecurity. But what if your company already owns some of it’s own tools, such as Microsoft Defender for Endpoint, Crowdstrike, or Carbon Black? In the video below, Mike explains

Read more ›