top of page
Search
![](https://static.wixstatic.com/media/8f0914_02c8969c5f0c49a6935f809d012922cc~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_02c8969c5f0c49a6935f809d012922cc~mv2.webp)
![Unveiling An Invisible Threat: WIFI Perils of Digital Tracking](https://static.wixstatic.com/media/8f0914_02c8969c5f0c49a6935f809d012922cc~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_02c8969c5f0c49a6935f809d012922cc~mv2.webp)
Sebastian Bowman
Sep 6, 20239 min read
Unveiling An Invisible Threat: WIFI Perils of Digital Tracking
We live in a hyper connected world where radio frequencies seamlessly intertwine alongside us with every step we take. If you were to...
114 views0 comments
![](https://static.wixstatic.com/media/11062b_0281f907224d4ddf96825edf916fe711~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/11062b_0281f907224d4ddf96825edf916fe711~mv2.webp)
![What 6 things should you know before your first cybersecurity job?](https://static.wixstatic.com/media/11062b_0281f907224d4ddf96825edf916fe711~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/11062b_0281f907224d4ddf96825edf916fe711~mv2.webp)
Katy Munden Hays
Jun 1, 20233 min read
What 6 things should you know before your first cybersecurity job?
Since we provide cyber defense, offense, & education, we asked our staff: What 6 things should you know before your first cybersecurity job?
49 views0 comments
![4 Cybersecurity Problems & Solutions](https://static.wixstatic.com/media/8f0914_7dc9d652e3c044429e51dba8ed7ee0cd~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_7dc9d652e3c044429e51dba8ed7ee0cd~mv2.webp)
Katy Munden Hays
Mar 2, 20232 min read
4 Cybersecurity Problems & Solutions
We review four common problems we hear about from clients, and the solutions we recommend for each.
62 views0 comments
![](https://static.wixstatic.com/media/8f0914_6e75b4cdc8064c859213f0fdea19e201~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_6e75b4cdc8064c859213f0fdea19e201~mv2.webp)
![Cyber Resilience Through Communication: Break the Silos](https://static.wixstatic.com/media/8f0914_6e75b4cdc8064c859213f0fdea19e201~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_6e75b4cdc8064c859213f0fdea19e201~mv2.webp)
Katy Munden Hays
Sep 12, 20224 min read
Cyber Resilience Through Communication: Break the Silos
Communication among people is key to the success of any team. As organizations mature in cyber resiliency, it becomes clear that...
48 views0 comments
![](https://static.wixstatic.com/media/8f0914_35771420f8fe4603a2886397e946700c~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_35771420f8fe4603a2886397e946700c~mv2.webp)
![Back to Basics: Layer, Layer, Layer Cybersecurity Solutions](https://static.wixstatic.com/media/8f0914_35771420f8fe4603a2886397e946700c~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_35771420f8fe4603a2886397e946700c~mv2.webp)
Katy Munden Hays
Sep 6, 20222 min read
Back to Basics: Layer, Layer, Layer Cybersecurity Solutions
When winter comes, two quality blankets layered on the couch are better than one. The same is true with cybersecurity. Be sure that you...
31 views0 comments
![](https://static.wixstatic.com/media/8f0914_846bcba886464c72b2fc7312605b4af3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_846bcba886464c72b2fc7312605b4af3~mv2.webp)
![Back to Basics: Stick to Cyber Safety Practices](https://static.wixstatic.com/media/8f0914_846bcba886464c72b2fc7312605b4af3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_846bcba886464c72b2fc7312605b4af3~mv2.webp)
Katy Munden Hays
Aug 23, 20223 min read
Back to Basics: Stick to Cyber Safety Practices
Two dogs are close to each other on a snowy yard, seeming to sniff at each other to see if each one wants to trust the other.
42 views0 comments
![](https://static.wixstatic.com/media/8f0914_dceec6586fa442e7a09dfb035e7dc289~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_dceec6586fa442e7a09dfb035e7dc289~mv2.webp)
![Back to Basics: Make (& Follow!) a Plan](https://static.wixstatic.com/media/8f0914_dceec6586fa442e7a09dfb035e7dc289~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_dceec6586fa442e7a09dfb035e7dc289~mv2.webp)
Katy Munden Hays
Aug 17, 20223 min read
Back to Basics: Make (& Follow!) a Plan
Make a cybersecurity plan. And then FOLLOW the plan. Without a plan and vigilant follow-through, very few security measures will be...
30 views0 comments
![](https://static.wixstatic.com/media/8f0914_fc5396eac39040918b01b1f700b878f2~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_fc5396eac39040918b01b1f700b878f2~mv2.webp)
![Back to Basics: Develop Your Team & Company Security Culture](https://static.wixstatic.com/media/8f0914_fc5396eac39040918b01b1f700b878f2~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_fc5396eac39040918b01b1f700b878f2~mv2.webp)
Katy Munden Hays
Aug 9, 20223 min read
Back to Basics: Develop Your Team & Company Security Culture
As students head back to school this month, we’re heading back to the cybersecurity basics and reviewing some best practices for a secure...
43 views0 comments
![Layers of Cybersecurity – 3 Key Areas to use Defense in Depth](https://static.wixstatic.com/media/8f0914_b4f73af1852540b49a5433620d71f7e7~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_b4f73af1852540b49a5433620d71f7e7~mv2.webp)
Katy Munden Hays
Jul 28, 20223 min read
Layers of Cybersecurity – 3 Key Areas to use Defense in Depth
It’s important to start with a plan. Before you design your network security policies, you need some goals and direction. Since we offer...
119 views0 comments
![What's wrong with Zero Trust?](https://static.wixstatic.com/media/8f0914_49e09c8ac8b6402fa9847feacbfeaf45~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_49e09c8ac8b6402fa9847feacbfeaf45~mv2.webp)
StandardUser
Jul 15, 20227 min read
What's wrong with Zero Trust?
Why terminology matters and why we need each other. Be prepared – we might upset some people here. We’ll be taking issue with a well-used...
64 views0 comments
![Where to Start? Three Basic Cybersecurity Needs](https://static.wixstatic.com/media/8f0914_17b3689319224ff5ba81ec1f012eed65~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_17b3689319224ff5ba81ec1f012eed65~mv2.webp)
Katy Munden Hays
Jun 28, 20224 min read
Where to Start? Three Basic Cybersecurity Needs
You probably hear a lot of talk of cyber hardening and cyber resilience. Though you know it’s time to put your shields up and tighten...
47 views0 comments
![Reduce Cyber Risk: Log, Configure, Manage](https://static.wixstatic.com/media/8f0914_7e8588171fd84a5584f82f0e2bcaa25a~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_7e8588171fd84a5584f82f0e2bcaa25a~mv2.webp)
Katy Munden Hays
Jun 21, 20223 min read
Reduce Cyber Risk: Log, Configure, Manage
What happens in the network, which settings are correct, and the follow-up to manage the system are all important aspects of...
28 views0 comments
![Reduce Cyber Risk: Control Who Gets Inside & How](https://static.wixstatic.com/media/8f0914_41583b73c845413892915db1895a0324~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_41583b73c845413892915db1895a0324~mv2.webp)
Katy Munden Hays
Jun 15, 20223 min read
Reduce Cyber Risk: Control Who Gets Inside & How
It’s easy to say “just control who accesses your data.” Reducing fingers in the cookie jar makes it much easier to protect the cookies...
39 views0 comments
![Reduce Cyber Risk: 11 Top Mitigations](https://static.wixstatic.com/media/8f0914_22ef4540887349bd8ca3ab2c3689a346~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_22ef4540887349bd8ca3ab2c3689a346~mv2.webp)
Katy Munden Hays
Jun 9, 20223 min read
Reduce Cyber Risk: 11 Top Mitigations
Cybersecurity risks are everywhere. Here is the good news – there are ways to mitigate these risks, and to defend against increasing...
51 views0 comments
![Too Many Risks: 10 Weak Cybersecurity Controls](https://static.wixstatic.com/media/8f0914_35d6a697006b4720b9d8c0e286fdfc7e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_35d6a697006b4720b9d8c0e286fdfc7e~mv2.webp)
Katy Munden Hays
Jun 1, 20223 min read
Too Many Risks: 10 Weak Cybersecurity Controls
What risks is your business taking unnecessarily? In the cybersecurity field, there are many risks to look for. CISA (Cybersecurity and...
75 views0 comments
![Automated SOC: Future-Ready Security Today](https://static.wixstatic.com/media/8f0914_747850eac6fd453f8c67053fc7453c4a~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_747850eac6fd453f8c67053fc7453c4a~mv2.webp)
Katy Munden Hays
May 18, 20223 min read
Automated SOC: Future-Ready Security Today
It's important to look ahead to future needs. And right now, the future is clear on one point: cybersecurity services will be needed more...
79 views0 comments
![](https://static.wixstatic.com/media/8f0914_a33bf56647ec471383aa003fb7144b7e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_a33bf56647ec471383aa003fb7144b7e~mv2.webp)
![What Makes Good Cybersecurity Hygiene?](https://static.wixstatic.com/media/8f0914_a33bf56647ec471383aa003fb7144b7e~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_a33bf56647ec471383aa003fb7144b7e~mv2.webp)
Katy Munden Hays
May 2, 20223 min read
What Makes Good Cybersecurity Hygiene?
You probably know what you should do and have read about best practices. You may even have consulted with professionals and taken a few...
44 views0 comments
![](https://static.wixstatic.com/media/8f0914_0750952216e04047bf4b1bdcc113bd44~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_0750952216e04047bf4b1bdcc113bd44~mv2.webp)
![Cybersecurity Terms Q&A for Business Owners and Leaders](https://static.wixstatic.com/media/8f0914_0750952216e04047bf4b1bdcc113bd44~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_0750952216e04047bf4b1bdcc113bd44~mv2.webp)
Katy Munden Hays
Apr 18, 20223 min read
Cybersecurity Terms Q&A for Business Owners and Leaders
The world of cybersecurity can be difficult to navigate. You know you need it, but you have questions. We’re here to help. Here are the...
60 views0 comments
![Is Cybersecurity Worth It? The High Cost of NOT Having a Cybersecurity Plan](https://static.wixstatic.com/media/8f0914_26b8a69509074c09b8863387430ef6db~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/8f0914_26b8a69509074c09b8863387430ef6db~mv2.webp)
Katy Munden Hays
Apr 5, 20223 min read
Is Cybersecurity Worth It? The High Cost of NOT Having a Cybersecurity Plan
Your business is worth protecting, and you’re actually losing valuable time and resources while you don't have a mature security plan.
58 views0 comments
![](https://static.wixstatic.com/media/8f0914_0f9ed1d672424f6ba416248a164694f1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8f0914_0f9ed1d672424f6ba416248a164694f1~mv2.webp)
![Cyber Maturity Quiz: Is Your Organization Growing?](https://static.wixstatic.com/media/8f0914_0f9ed1d672424f6ba416248a164694f1~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/8f0914_0f9ed1d672424f6ba416248a164694f1~mv2.webp)
Katy Munden Hays
Mar 22, 20222 min read
Cyber Maturity Quiz: Is Your Organization Growing?
In our work as both a defensive and offensive cyber company, we hear these questions regularly: How do I get started with cybersecurity?...
71 views0 comments
bottom of page