Blog:
Security
Made
Simple

How to build your security strategy and roadmap: Part 2

Continuation from part 1 The cybersecurity industry has fed and, to a large extent, continues to feed off fearmongering. As a result, organizations are spending millions of dollars on shiny security p…

How to build your security strategy and roadmap: Part 1

Since the advent of the internet, businesses of all sorts, sizes, and locations have tried to explore new and larger markets to capture. It has provided them with new opportunities for which they work…

planning cybersecurity protocols and policies
The Best Way to Protect Your Organization from Cybersecurity Threats, Pt.3

Welcome back to Cybersecurity as an Iceberg. Last time in part two, we went over Insider Threats, Lack of Security Awareness Training, and Missing Policies. Today, we will discuss the last three hidde…

cybersecurity awareness training
The Best Way to Protect Your Organization from Cybersecurity Threats, Pt.2

Welcome to part two of our blog series, Cybersecurity as an Iceberg. In part one of this blog series, we discussed two unaddressed risks in cybersecurity: Third-Party Risks and Data Privacy Law Violat…

unaddressed cybersecurity threats and risks
The Best Way to Protect Your Organization from Cybersecurity Threats, Pt.1

Cybersecurity is like an iceberg. Organizations tend to address threats that are apparent at the tip of the iceberg. However, there is at least 7/8ths of the iceberg under the water. This is also wher…

That dreaded phone call – what to do next?

Ransomware has taken a center stage, should organizations pay to retrieve their files?

Tips to cybersecure your home network

With employees forced to work from home due to the pandemic, securing the home network should be a top priority. Here are few DIY steps that can be really useful even for the non-tech savvy person.

A holistic approach to combating cyber threats

The impact of a major cyber-attack to an organization’s brand, reputation, and business operations can be catastrophic. Weaknesses in information security can jeopardize your mission, threaten your pr…

Planning to get DoD Cybersecurity Maturity Model Certification (CMMC)?

In order to protect the U.S. defense supply chain from foreign and domestic cyber threats, and reduce the overall security risk of the sector, the Department of Defense is mandating that all contracto…

Follow along the journey

Follow us on social and never miss a post from this blog. Only original content and minimalist views, shared weekly on social.