There is a lot more to maintaining a good cybersecurity program than the five important items mentioned here, especially if you are in a high-compliance line of work such as healthcare or government contracting. But it’s an excellent place for small and medium organizations to start.
For many of us, our mobile devices hold as much or more, sensitive data than our workstations or desktops. So why should adequate security on our phones be any different?
There was a time when strong passwords were good enough to protect your information. More recent wisdom recommends we use passphrases, which are longer and much harder to crack.
Today, as phishing attempts get more sophisticated, you must adapt accordingly because passwords alone don’t cut it […]