Blog

Network Infrastructure Management | Cybersecurity Risk Assessment Template

What is the best template to use for a cybersecurity risk assessment, for Network Infrastructure Management? In this video I explain the 8 best practices to protect your company’s data, according to the CIS Framework. Want my recommendations on the

Read more ›

Cybersecurity Risk Assessment Template: Data Recovery

What is the best template to use for a cybersecurity risk assessment, for Data Recovery? In this video, I explain the 5 best practices to protect your company’s data, according to the CIS Framework. Want my recommendations on the best

Read more ›

Cybersecurity Risk Assessment Template: Malware Defenses

What is the best template to use for a cybersecurity risk assessment, for Malware Defense? In this video, I explain 7 steps to protect your company from potential malware threats. Want my recommendations on the best companies to quote for

Read more ›

Cybersecurity Risk Assessment Template: Email and Browser Protection

What is the best template to use for a Cybersecurity risk assessment, for email and browser protection? In this video, I explain 7 steps to protect your email and browser from possible threats. Want my recommendations on the best companies

Read more ›

Cybersecurity Risk Assessment Template: Audit Logs

What is the best template to use for a cybersecurity risk assessment, for Audit Logs? In this video, I explain the best template to follow based on three different categories of cybersecurity requirements. Want my recommendations on the best companies

Read more ›

Cybersecurity Risk Assessment Common Findings: Continuous Vulnerability Management

What are the most common findings of a cybersecurity risk assessment, within the CIS Framework, Control 7: Continuous Vulnerability Management In this video, I explain the 3 most common findings within this control: 1. Continuous Monitoring; 2. Automatic analysis; and

Read more ›

Cybersecurity Risk Assessment Common Findings: Access Control Management

What are the most common findings of a Cybersecurity Risk Assessment, in terms of CIS Control 6: Access Control Management? In the video below, Mike explains the two most common findings, according to his conversations with cybersecurity engineers, performing risk

Read more ›

Cybersecurity Risk Assessment Common Findings: Account Management

What are the most common gaps found within companies, when performing a formal cybersecurity risk assessment? In the video below, Mike explains the most common findings within CIS Control #5 – Account Management. Want Mike’s recommendations on the best vendors

Read more ›

Cybersecurity Risk Assessment Common Findings: Configuration of Enterprise Assets and Software

What are the most common findings of a cybersecurity risk assessment, in regards to the configuration of enterprise assets and software? In the video below, Mike explains why IoT devices and USB drives are the most common gaps found in

Read more ›

Cybersecurity Risk Assessment Common Findings: Data Protection

What are the most common findings, when a 3rd party performs a cybersecurity risk assessment for a company, specifically in regards to data protection? In the video below, Mike explains a few easy things your company can implement for data

Read more ›