We found – 50 articles for cyber
Cybersecurity Risk Assessment Common Findings: Account Management
What are the most common gaps found within companies, when performing a formal cybersecurity risk assessment? In the video below, Mike explains the most common findings within CIS Control #5 – Account Management. Want Mike’s recommendations on the best vendors…
Cybersecurity Risk Assessment Common Findings: Configuration of Enterprise Assets and Software
What are the most common findings of a cybersecurity risk assessment, in regards to the configuration of enterprise assets and software? In the video below, Mike explains why IoT devices and USB drives are the most common gaps found in…
Cybersecurity Risk Assessment Common Findings: Data Protection
What are the most common findings, when a 3rd party performs a cybersecurity risk assessment for a company, specifically in regards to data protection? In the video below, Mike explains a few easy things your company can implement for data…
Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls
What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in…
Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control
When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but…
Cybersecurity Risk Assessment Steps
What steps are involved in a cybersecurity risk assessment? In the video below, Mike Smith explains his opinion on the 11 steps involved in a cybersecurity risk assessment, and the order in which they should be taken. Want Mike’s recommendations…
The Best Business ISPs for Large, Multi-Site Companies
You’re working for a large organization, with multiple sites. But with two ISPs at every site, ISP management is getting insane. You have tons of account numbers, a dozen ISPs with a dozen phone numbers, and staggered contract expiration dates.…
SD-WAN Vendors: 5 Questions to Narrow Your Comparison – A Broker’s Perspective
Your company is in the market for SD-WAN vendors, but not sure where to start. In this video, I explain the best 5 questions to narrow your comparison options. Want my recommendations on the best SD-WAN solutions that your company…
What is a Virtual CISO?
What is a Virtual Chief Information Security Officer (vCISO)? In the video below, Mike details the attributes of a good Virtual CISO, and also tells you the various services that they offer. He also compares this to other cybersecurity services,…
Managed Detection and Response Providers Comparison: Endpoint Tools
Your company is comparing Managed Detection and Response (MDR) providers for cybersecurity. But what if your company already owns some of it’s own tools, such as Microsoft Defender for Endpoint, Crowdstrike, or Carbon Black? In the video below, Mike explains…