Five Security Questions To Ask Before You Sign Any Software or Support Contract
A concise list for non-technical leaders to ask vendors about MFA, encryption, and breach notification. No organization can do it all. Throughout life we are dependent upon others.- Do you process your own oil to produce the gasoline…
You’re Collecting More Data Than You Realize. That’s a Problem
Helping organizations audit what personal data they hold and understand why minimizing it reduces risk In January 2025, a nonprofit healthcare provider in Connecticut, Community Health Center (CHC), disclosed that a hacker had stolen the…
Non-Profits: The Cybersecurity Problem
Non-profits have many of the same cybersecurity issues as for-profit companies. These potential threats are “invisible” yet need to be addressed. But, non-profits, whether houses of worship, trade organizations, advocacy organizations or…
Canopy.us for child safety
How do we protect our children online? This is a common question from parents. There are numerous solutions available but you must find the one that fits you. Some families use Google Family Link. This is a great solution if you are…
DIY Cyber Risk Assessment
This is the second of two articles on Risk Assessments. The first part asked the question, Do I Really Need To Do A Cybersecurity Risk Assessment? This article gives an introduction to conducting a Risk Assessment and helps explain the…
Do I Really Need To Do A Cybersecurity Risk Assessment?
Of course you do! And let’s talk about why. So the real question becomes two — Why is this important? and How do you do this? Let’s work on answering the first question… Why is a cybersecurity risk assessment important for your…
Keeping the Lights On and the Packets Flowing
Think about this possibility… It’s Monday morning. You’re dragging and you head to the coffee pot to get the first cup of the day. People are just starting to show up at the office. Then you hear a loud BOOM, the electricity goes…
Protecting Your Home and Business with DNS Filtering
There are many reasons to limit the types of websites that are accessible from your work or home network. A couple of the most common are (1) to keep inappropriate material from being accessed, and (2) protect from known websites that…
Be Prepared for Bad Things to Happen!
An Introduction to Incident Response for SMBs Overview Every organization experiences cyberattacks and these are referred to as incidents. Incident almost always refers to something bad happening. Sometimes an incident results in a…






