What is Log Management – Minnesota Cybersecurity

  In the wonderful world of cybersecurity, one of the favorite tools to use to detect malicious attempts to breach and compromised data is a tool we call SIEM. SIEM: Security Information and Event Management Not only can it help us detect events when it’s...

Minnesota Cybersecurity Endpoint Strategy

We have a tendency in cybersecurity to make everything a big deal. As a cybersecurity advisor, I try not to be that person that is yelling, “the sky is falling and the world is coming to an end”. But, if I had to pick only three ‘big deals’ it...

How to Setup a Company Firewall

What’s the best way to set up a company firewall for your business? That’s the right question to ask once you’ve made a decision to protect the perimeter, servers, or endpoints on your network with a firewall. This is an often overlooked question because people...

Minnesota Ransomware Security Consultants

Do you have a computer that has been hijacked by a malicious hacker asking for money to unlock it? Are they threatening you by adding a timer, only giving you so long to respond? Even worse, has this ransomware spread to other computers on your network and even...

What is a Cybersecurity Maturity Model?

What is a Cybersecurity Maturity Model? It is a framework of security controls combined with a standardized way of measuring the maturity of each area or pillar. It is repeatable and conformed to a process. Because the process is repeatable, the system can be used for...