What is Prescriptive Security – Cybersecurity

I’ve wasted so much money at the doctor’s office. It’s deeply influenced the way I look at ‘going to the doctor’. I’ll be that guy that should’ve gone in a lot earlier, but now I”m stuck with some horrible prognosis...

What is Log Management – Minnesota Cybersecurity

  In the wonderful world of cybersecurity, one of the favorite tools to use to detect malicious attempts to breach and compromised data is a tool we call SIEM. SIEM: Security Information and Event Management Not only can it help us detect events when it’s...

Minnesota Cybersecurity Endpoint Strategy

We have a tendency in cybersecurity to make everything a big deal. As a cybersecurity advisor, I try not to be that person that is yelling, “the sky is falling and the world is coming to an end”. But, if I had to pick only three ‘big deals’ it...

How to Setup a Company Firewall

What’s the best way to set up a company firewall for your business? That’s the right question to ask once you’ve made a decision to protect the perimeter, servers, or endpoints on your network with a firewall. This is an often overlooked question because people...

Minnesota Ransomware Security Consultants

Do you have a computer that has been hijacked by a malicious hacker asking for money to unlock it? Are they threatening you by adding a timer, only giving you so long to respond? Even worse, has this ransomware spread to other computers on your network and even...