№ 239

Cyber Risk Governance

In light of the SEC's new regulations, it's vital to incorporate cyber risk considerations into your corporate governance structure.

AUG 6 · 1 MIN INFOSEC TIPS
№ 238

Cyber Risk Reporting

Encourage the adoption of cyber risk reporting in board meetings. Understanding the cyber risks faced by the company can help to guide strategy and ensure appropriate resources…

AUG 6 · 1 MIN INFOSEC TIPS
№ 237

Data Sanitization

Data sanitization is the process of completely eradicating data from storage media. Before disposing of, selling, or reusing any storage devices, make sure that data has been…

AUG 6 · 1 MIN INFOSEC TIPS
№ 236

Third-Party Risk Management

Before entering into contracts with vendors or third parties, ensure there are proper cybersecurity standards, controls, and audits in place.

AUG 6 · 1 MIN INFOSEC TIPS
№ 235

Practice Cyber Offense to Mitigate Risks

In football, a strong offense is essential for gaining ground and scoring points. Similarly, in cybersecurity, practice a proactive cyber offense to mitigate risks.

AUG 6 · 1 MIN INFOSEC TIPS
№ 234

Be a Cyber MVP (Most Valuable Protector)

In football, the MVP is the most valuable player, and in cybersecurity, you can be the Most Valuable Protector of your digital assets.

AUG 1 · 1 MIN INFOSEC TIPS
№ 233

Create a Cyber Defense Playbook

Similar to a football team having a playbook with strategic plays, develop your own cyber defense playbook to tackle potential threats.

AUG 1 · 1 MIN INFOSEC TIPS
№ 232

Stay Ahead with Cyber Defense Audits

Like a football team analyzing game footage to improve their performance, conduct regular cyber defense audits to stay ahead of potential threats 😃.

JUL 18 · 1 MIN INFOSEC TIPS
№ 231

Secure Your Voice Assistants

Protect the privacy and security of your voice assistants with these tips: - Where possible, change the default wake word to a unique one to avoid accidental activations.

JUL 18 · 1 MIN INFOSEC TIPS
№ 230

Beware of wandering eyes or shoulder surfing”

Shoulder surfing, a “technique” used by attackers to steal sensitive information by watching your screen or keyboard inputs.

JUL 18 · 1 MIN INFOSEC TIPS