Welcome to my blog

Join me on my journey as I share my insights and experiences on all things Apple, Business and Entrepreneurship!

Downloads

2021

Download our White Paper - Penetration Testing for your Business

The old saying goes to beat a hacker you must think like a hacker and this is exactly the type of scenario that many information systems must have the proper controls and hardening in place to prevent or mitigate. In order to confirm that the controls on an information system have been properly implemented, the only tried and true method is to actually attempt to hack into it using the same types of tools, techniques, and methodologies that a threat actor would attempt in order to bypass the security controls...

Download our White Paper - Cybersecurity Training 101 For Small Businesses

What is social engineering and am I affected? Simply speaking, there is more to cybersecurity than computers and how they work. This statement includes how your network is setup or even how your firewall is configured, etc. Within cybersecurity there is actually a heavy emphasis on people as they interact directly with data within the organization. These people (employees) can have duties such as maintaining computers, configuring computers, helping others with computer problems, etc. and tend to not be as rational as computers as they can be swayed by emotion....

Download our CMMC White Paper and learn what CMMC means for your small business.

The DoD implemented requirements for safeguarding CUI information and cyber incidents through the release of Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 in October 2016. The DFARS directed DoD Contractors to self-attest that adequate security controls were implemented within contractor systems to ensure that CDI confidentiality was maintained.

2020

Remote Work Guide Do's and Dont's

Do’s Read & Acknowledge your company’s remote work and bring your own device (BYOD) policies and procedures Avoid using your personal device for work and restrict the use of company issued devices for personal use Protect the data you are accessing by using a VPN to login the company network Dont’s Ignore the guidelines in your company’s policies. Make the required changes if any Let family members or friends use your company issued device Use public WiFi to access the company network without using a VPN Looking for more tips...