Featured

Business IT Security 101

Business IT Security 101 As the cyber threats facing businesses keep multiplying, owners are asking “what should I do to protect my business?”. Let’s break this down. Step 1 – Understanding your Risk and Exposure Before you can fix the

Security and Privacy – two sides of the same coin

Security and Privacy – two sides of the same coin One of the toughest parts of my job is explaining the difference between security and privacy. I find that the confusion between the two often leads people to a feeling

Organization Is The Main Prerequisite For Security

Organization Is The Main Prerequisite For Security I’ve always said that security starts with organization. What does that really mean for your organization (no pun intended)? The idea is that you cannot secure what you do not know exists. And

Why DNS Protection Should be the Keystone of your IT Security Program

Why DNS Protection Should be the Keystone of your IT Security Program There is a saying in automotive safety, the safest accident is the one that never happens. Applied to IT Security, the best security incident is the one that

Security Through Obscurity – What is it and When is it is OK to Employ it?

Security Through Obscurity – What is it and When is it is OK to Employ it? Security Through Obscurity is the practice of hiding vs securing. It generally conjures negative associations but when used strategically it could help to improve

Technology Providers, What’s up with all the Acronyms, & What’s the difference?

Technology Providers, What’s up with all the Acronyms, & What’s the difference? Let me start by saying that you will be hard-pressed to find another profession with as many acronyms as we have in IT. I will run through several

The difference between a traditional and next-gen AV

What’s the difference between a traditional AV and next-gen AV? Today everyone has a favorite application for antivirus and everyone you ask will have a story about how their AV “saved them from an attack”. As a lover of analogy,

Comparing IT and Physical Security

Comparing IT and Physical Security In traditional physical security as well as fire prevention there is a KPI that deals with the time it takes for an attacker to bypass the system or in the case of fire prevention, how

Why can’t we prevent all incidents

Why can’t we prevent all incidents When I tell people that I work in Cybersecurity the first question I get is if I can hack. The second question I get is, “if I use Norton or Mcafee as my Anti-Virus

The Best way to Provide Secure Remote Access

The Best way to Provide Secure Remote Access While we are battling Covid-19 most employees are forced to work remotely. This brings up the question of what’s the most secure way to connect remote employees. VPN is one that gets

How security incidents begin…

How security incidents begin… When most people think of IT security they think of either the bad guys, sitting in hoodies in the basement “breaking through the firewall” or the good guys chasing them in a helicopter. The reality is

Because every business deserves affordable security and compliance solutions

© 2020 Iospa Tech LLC. All Rights Reserved. Various trademarks held by their respective owners.