Cybersecurity lessons from a pandemic

Cybersecurity lessons from a pandemic We often hear the phrase, “layers, layers, and more layers”. The reality, as I have written before, is that not all layers are created equal and some do more harm than good. An example of

Why whitelisting MFA from your IP address is a poor security practice.

Why whitelisting MFA from your IP address is a poor security practice. Introduction: Multi-Factor Authentication (MFA) was designed to offer a higher level of security than passwords alone. However, like many security safeguards, the addition of one safeguard is often

Security and Privacy – two sides of the same coin

Security and Privacy – two sides of the same coin One of the toughest parts of my job is explaining the difference between security and privacy. I find that the confusion between the two often leads people to a feeling

Organization Is The Main Prerequisite For Security

Organization Is The Main Prerequisite For Security I’ve always said that security starts with organization. What does that really mean for your organization (no pun intended)? The idea is that you cannot secure what you do not know exists. And

Why DNS Protection Should be the Keystone of your IT Security Program

Why DNS Protection Should be the Keystone of your IT Security Program There is a saying in automotive safety, the safest accident is the one that never happens. Applied to IT Security, the best security incident is the one that

Security Through Obscurity – What is it and When is it is OK to Employ it?

Security Through Obscurity – What is it and When is it is OK to Employ it? Security Through Obscurity is the practice of hiding vs securing. It generally conjures negative associations but when used strategically it could help to improve

Technology Providers, What’s up with all the Acronyms, & What’s the difference?

Technology Providers, What’s up with all the Acronyms, & What’s the difference? Let me start by saying that you will be hard-pressed to find another profession with as many acronyms as we have in IT. I will run through several

The difference between a traditional and next-gen AV

What’s the difference between a traditional AV and next-gen AV? Today everyone has a favorite application for antivirus and everyone you ask will have a story about how their AV “saved them from an attack”. As a lover of analogy,

Comparing IT and Physical Security

Comparing IT and Physical Security In traditional physical security as well as fire prevention there is a KPI that deals with the time it takes for an attacker to bypass the system or in the case of fire prevention, how

Why can’t we prevent all incidents

Why can’t we prevent all incidents When I tell people that I work in Cybersecurity the first question I get is if I can hack. The second question I get is, “if I use Norton or Mcafee as my Anti-Virus

Because every business deserves affordable security and compliance solutions

© 2020 Iospa Tech LLC. All Rights Reserved. Various trademarks held by their respective owners.