BLOG

Value of a Risk Assessment

  I’ve always been troubled with the idea of how to provide valuable cybersecurity services without selling fear. I don’t want to be a fear monger. The answer is to sell logic. There is logic and there emotion. Often times we default to emotion when we don’t know the...

Top Cybersecurity Threats to Manufacturing Industry

  The topic of 'risk' and 'threats' can be confusing, and sometimes overwhelming for those that do not spend all their time organizing the uglies of cybersecurity. So before we jump into the biggest threats that the manufacturing industry is faced with let's define...

Biggest Cybersecurity Risks to Manufacturing in 2019

The cybersecurity threat landscape keeps changing. Every day there are new threats, exploits, and reports of breaches. If one thing has stayed the same it's that the threat is real and it's knocking on the door of corporate networks and seeing what can be leveraged...

What Does a Cybersecurity Analyst Do

  What Does a Cybersecurity Analyst Do?  For more than twenty years, I have been working as a cybersecurity Minnesota consultant in the ever-changing world of technology. Most people have some understanding of the need for cybersecurity. It is rare that much...

How to Use Metrics in Cybersecurity

"What gets measured gets managed," the famous words from Peter Drucker. I've tried many ways of putting metrics around security initiatives. Some have been successful, some have been a failure, the worst have added confusion. Reporting cybersecurity metrics does have...

What is Prescriptive Security – Cybersecurity

I've wasted so much money at the doctor's office. It's deeply influenced the way I look at 'going to the doctor'. I'll be that guy that should've gone in a lot earlier, but now I"m stuck with some horrible prognosis because I delayed. I once went in to have my knee...

What is Log Management – Minnesota Cybersecurity

  In the wonderful world of cybersecurity, one of the favorite tools to use to detect malicious attempts to breach and compromised data is a tool we call SIEM. SIEM: Security Information and Event Management Not only can it help us detect events when it's configured...

Minnesota Cybersecurity Endpoint Strategy

We have a tendency in cybersecurity to make everything a big deal. As a cybersecurity advisor, I try not to be that person that is yelling, "the sky is falling and the world is coming to an end". But, if I had to pick only three 'big deals' it would be user security...

How to Setup a Company Firewall

What's the best way to set up a company firewall for your business? That’s the right question to ask once you’ve made a decision to protect the perimeter, servers, or endpoints on your network with a firewall. This is an often overlooked question because people assume...

Minnesota Ransomware Security Consultants

Do you have a computer that has been hijacked by a malicious hacker asking for money to unlock it? Are they threatening you by adding a timer, only giving you so long to respond? Even worse, has this ransomware spread to other computers on your network and even...